Skip to main content
  • Are Multi-Factor Authentication (MFA) Solutions Equally Secure?
    Are Multi-Factor Authentication (MFA) Solutions Equally Secure?

    Happy Beginning

    US National Institute of Standards and Technology (NIST) tells us that stopping all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim. It’s simple: turn on MFA today! [1]

     

  • How Easy Can Someone Know Where You Are Through Your Phone?
    How Easy Can Someone Know Where You Are Through Your Phone?

    Mobile Network Standard That Affects Us All

    Because many of us have smartphones, the target on our backs is bigger than ever. Hackers, even nation states, are targeting smartphones to tap into cameras and microphones, but crucially and most of all, your data including your geo-location data.

  • Digital Forensics 2.0
    Digital Forensics 2.0

    Changing World, Changing Way

    As today’s cyber space continues to evolve, so must the way we conduct cyber investigations. Sources of evidence are growing rapidly. For those who fail to keep up, collecting and authenticating evidence during a cyber investigation will prove to be a difficult task. For those with a clear understanding of how to leverage advances in technology and the wealth of information available online, the evidence collected during a cyber investigation can help create a solid court case.

     

  • When Journalist Under Cyber Attacks
    When Journalist Under Cyber Attacks

    In the Beginning

    One chilly evening a quick-breathing voice muttered over the phone saying his laptop computer was sabotaged. As the story unfolded, a journalist John who reported in-depth news about a political figure has been warned to keep quiet. John continued his job as usual. Somehow one evening when John was too tired and slammed his laptop to the sleep mode. So was he. Early next morning when he got up, to his surprise, he found the wallpaper of his computer was replaced by a bloody chopped head’s theme.

  • Asymmetric Threats in Cybersecurity
    Asymmetric Threats in Cybersecurity

    Asymmetric Threat

    The concept of “asymmetric threat” has its root from the military [1].  The asymmetric threat is defined as an attempt to circumvent or undermine an opponent’s strengths while exploiting the weakness, using methods that differ significantly from the opponent’s usual mode of operations.