Where does attacker get our information?

Posted Posted in Attack

Where does the attacker get our information? Our information can be found in the following Facebook Unless the privacy setting in the Facebook is set correctly, else the public can view your post and personal information. Linkedin Your personal detail : education history, employment history and other can be found. […]

Phishing Email

Posted Posted in Attack, Web Security

Our inbox received lots of emails per day. Most of the email received were junk mails or useless emails to us. What is the danger opening those malicious email? They can be ransomware, delete your information in the system and network, steal your information (address book), use your system as […]

Malware Attack

Posted Posted in Attack

How can we protect ourselves against Malware Attack? The Answer is NO way to protect 100%. We need to understand how is the attack being carried out. Malware comes from the following source Email attachment (.exe,.com and any executable file) and phishing email. Download program: especially freeware. Usually, install more […]


Posted Posted in Attack, Computer Security

Ransomware is computer malware that encrypts the victim’s working files. The attacker will ask the victim for ransom to decrypt the victim’s files. Please note that there is no promise that the victim’s file can be recovered even the ransom is paid. Once the file is being encrypted, there is […]