Some people believe that they can write anything about anybody online. But when someone posts false statements with the intention to damage the reputation of an individual or a business, whether on blogs, forums, websites or social media, this can be considered as online defamation. False written statements like these are also known as libel.
Spam are unwanted bulk messages sent through electronic messaging systems. The most widely recognized form of spam is sent through email, but can also refer to bulk messages sent through other media such as:
- Instant messaging spam
- Search engine spam
- Mobile phone text messages
- Junk fax transmissions
- File sharing spam
Passwords are the first line of defense to keep other people out of your computer, mobile phone, data and online accounts and this is why we must learn how to create strong passwords to protect ourselves. Unfortunately, many of the passwords people use are short and simple or have been used for a long period of time and for multiple accounts. Think of your password like a house key – it enables you to lock up your house, but you have to keep the key in a safe location.
Basic guide to creating strong passwords
It’s common in Brunei Darussalam to receive the latest news or photos from your friends through social media, especially through messaging services such as WhatsApp. The majority of these messages tend to be false and unfortunately will spread like wildfire when people forward them to everyone they know.
People tend to have a lot of different applications on their smartphones and computers just to kill time. However, there are a few things to look out for to ensure your safety and security.
What are apps?
Apps (or applications) are programs that can be used on a mobile device, and are often great sources of news, education, lifestyle or entertainment such as games and social networking. They can be downloaded cheaply or even for free on computers, mobile devices and even some TVs.
ATM skimming is like identity theft for debit cards. It is an illegal activity that involves installing hidden devices that secretly record bank account details when a user inserts an ATM card into the machine. Criminals can then use the stolen data to create a cloned card to withdraw money from the victim’s bank account either locally or overseas.
Skimming typically requires two separate components to work.