Cyber Security

The history of computer technology has come with the parallel concern of cyber security and data privacy threats. Cyber security threats like Ransomware and other types of malware have been overcome,
Continue Reading
KODE OTP
  The rise of OTP code fraud has begun to worry users of banking, fintech, and e-commerce applications. In this day and age, hackers have now found various ways to lure victims into submitting
Continue Reading
perusahaan fintech
Fintech companies are currently developing at an exponential rate. In Indonesia, Fintech companies must have permission from OJK to be used by the general public. The services offered are quite divers
Continue Reading
social engineering
The term ‘Social Engineering Attack’ is used to describe various crimes committed through the influencing of human behavior. These techniques use psychological manipulation so that they can trick vict
Continue Reading
email phishing
Phishing Email is one of the most commonly used techniques employed by hackers, whereby they send emails that contain dangerous links in order to obtain sensitive information from their victims, such
Continue Reading
data breaches
A data breaches occurs when a hacker successfully infiltrates a computer’s hard disk and gains access to any personal/important files within. They are then likely to use your personal data for various
Continue Reading