What is phishing email? Phishing is a social engineering attack that is commonly used to steal user data, including login credentials and credit card numbers. This happens when an attacker masquerading as a trusted entity tricks the victim to open an email, instant message, or text message. Then, trick the recipient into clicking a malicious…
Category: Others

Real-Time Voice Authentication
Voice Authentication “What is your mother’s maiden name?”, “What’s your pet’s name?”. Do these sound familiar to you? Are you still using these security questions? Nowadays consumers are much more demanding. What they are expecting is immediate service with zero delay. A long and tedious authentication process is no longer an option! Seamless Voice Authentication…

Coronavirus Solution : Protective Clothing Validation in Public
Protective clothing validation, such as face masks Since the Coronavirus outbreak, a lot of public and private entities have made protective clothing mandatory such as face mask. The purpose of this measure is to provide better protection for the population from the pandemic. To ensure the implementation of this measure, the currently available resources and…

Covid-19 : Is your organization ready for a fully remote workforce
Organizations might not be fully ready for a remote workforce Many organizations think they have the tools needed to allow employees to work from home seamlessly. But now that working remotely has been necessary for many organizations due to the Covid-19 outbreak. To keep a social distance between your staff or workers to avoid your…

Cyber security Agencies have been warned
KUALA LUMPUR: Malaysia is vulnerable to progressively well-structured cyber-criminals who are leveraging on new technologies for monetary gain. This has given an urgent warning to the head of the national cyber-security agency. Cyber Security “Cyber security threats were constantly evolving to the emergence of new technologies, resulting in an even higher need for comprehensive cyber-security…