FILTER RESULTS
FILTER RESULTS
close.svg
Search Result for “theft”

Showing 1 - 4 of 4

Image-Content

TECH

Protect yourself when online

Life, James Hein, Published on 03/08/2022

» A friend of mine, let's call him Dave, wrote to me recently about identity theft. He told me that all of his identifying information like phone numbers, email addresses, old passwords and his usual security questions, were all available on the dark web. He also had a number of notifications of personal information breaches that resulted in fraudulent charges, the need to replace credit cards and attempts to set up fake bank accounts in his name. The latter is used if a hacker is planning to get into your other accounts so they can transfer funds to themselves under your name.

Image-Content

BUSINESS

Personal privacy in the balance

Business, Published on 11/03/2019

» Data is hailed as the new "oil" of the 21st century, with digitalisation changing the landscape across every segment of society and business. When valuable and personal data can be exploited for personal or corporate gain, there is a need to ensure that personal information is well protected from fraud and mischief.

Image-Content

OPINION

Update the computer law

News, Editorial, Published on 18/04/2018

» If events over the past two weeks do not convince the government to write an actual law covering computer fraud, maybe nothing will. The first unfortunate event was to threaten a Chiang Mai magazine editor with a computer crime charge over something that had nothing to do with computers (or crime, come to that). The second was the reluctant admission by the country's second mobile phone company of security misbehaviour, putting tens of thousands of customers at risk. That is not a crime.

Image-Content

WORLD

'Billions' of records at risk from mobile app data flaw

Published on 17/06/2015

» SINGAPORE — Security researchers have uncovered a flaw in the way thousands of popular mobile applications store data online, leaving users' personal information, including passwords, addresses, door codes and location data, vulnerable to hackers.