phishing

share

Anyone who is connected to the internet, and especially those who have online accounts such as social networking or email, could get compromised or ‘hacked’.  The faster you respond to a successful attack, the faster you can minimize the damage. 

 

How does an attacker get your password? 

  • From ‘phishing’ sites where you unintentionally gave your credentials 
  • From infected free software that you have installed on your computer 
  • Your online security is weak 
  • Your password is easy to guess 

 

share

 

There used to be a time when shopping on the internet was very rare and uncommon, but thanks to the emergence of Facebook and Instagram e-shops, Bruneians have now learned to gain trust in making purchases with the click of a mouse, whether for clothing, electronics or car parts. While this has proven to be convenient, there are also risks involved with online shopping and people should be aware of them. 

 

Risks of online shopping 

share

 

Spam are unwanted bulk messages sent through electronic messaging systems. The most widely recognized form of spam is sent through email, but can also refer to bulk messages sent through other media such as: 

  • Instant messaging spam 
  • Search engine spam 
  • Mobile phone text messages 
  • Junk fax transmissions 
  • File sharing spam 

 

share

 

Identity theft occurs when someone steals personal information such as your name, identity card number or credit card number, so that they can pretend to be someone else. This is usually done to gain access to finances, get medical benefits, to avoid the police, or to commit other crimes. 

 

How do identity thieves find your personal information? 

share

 

As businesses and individuals rely on emails for communication, it is critical to protect the information contained in emails against threats. Email is one of the most popular mediums for phishing attempts or virus distribution, especially through email attachments. 

 

Email security threats 

Pages