Hackers are becoming smart in that they are investing an unlikely resource, time. Low and slow attacks are frequenting. These are the hardest to detect and probably the deadliest. The attackers ..
How to Prevent Cyber Crime or Cyber Fraud Attacks that are serious borderless concerns to government, being impacted or exploited from anywhere in the world. Fraud scams need not be sophisticated ..
Cryptocurrency and Blockchain technology not only worked as a technology but also as an ideology. And that ideology is most probably going to be the base of the security architectures ..
Robust solution suite offers resources to help small businesses increase efficiency and grow faster
As virtual banks emerge in Asia and traditional banks embrace digital business models, there is a growing need of more O2O (Online to offline) networks. Our collaboration with ICBC ..
The manner in which individuals impart in their own lives has changed yet the tools they use at work are as yet stuck in yesterdays. Individuals utilize WhatsApp, Instagram, and Facebook ..
When scientists deploy the internet to communicate with each other, internet protocol (IP) was the backbone of it. Every device communicating on the Internet requires a unique Internet ..
In May 2017, Cyber security Malaysia confirm the “WannaCry” ransom ware attack spread across Malaysia. The attack, which locks computers and holds users’ files for ransom ..
Blockchain technology is gaining momentum with more and more diverse applications, as well as increasing numbers of users involved in its applications. This novel technology rooted ..
On the 28th of July 2017, MIBrand was fortunate enough to have a chat about IR 4.0 with Yang Berbahagia Dato’ CM Vignaesvaran Jeyandran, the Chief Executive of the Human Resources ..