Before Computer Networks existed, the idea of a computer ‘virus’ was already an existing concept, although still a hypothesis. The theory of a program reproducing
The development of internet technology has given way to a parallel threat spreading across the online world: Cybercrime. Such methods of criminality are generally concerned
The history of computer technology has come with the parallel concern of cyber security and data privacy threats. Cyber security threats like Ransomware and other
Fintech companies are currently developing at an exponential rate. In Indonesia, Fintech companies must have permission from OJK to be used by the general public.
The term ‘Social Engineering Attack’ is used to describe various crimes committed through the influencing of human behavior. These techniques use psychological manipulation so that
Phishing Email is one of the most commonly used techniques employed by hackers, whereby they send emails that contain dangerous links in order to obtain sensitive
A data breaches occurs when a hacker successfully infiltrates a computer’s hard disk and gains access to any personal/important files within. They are then likely