Email:

Phone No.

Whatsapp

Blog

The Untold Story of the Man That Made Mainstream Encryption Possible
The Untold Story of the Man That Made Mainstream Encryption Possible
The Untold Story of the Man That Made Mainstream Encryption Possible
The Untold Story of the Man That Made Mainstream Encryption Possible

The Untold Story of the Man That Made Mainstream Encryption Possible

The Untold Story of the Man That Made Mainstream Encryption Possible Longtime tech journalist Steven Levy’s new book, Facebook: The Inside Story, details how Mark Zuckerberg transformed a tasteless dorm room social networking experiment into the world’s biggest social networking business. In honor of that release, we thought we’d share an excerpt of an earlier Levy book, Crypto, about

German Woman Dies in First Known Death From a Cyber Attack on a Hospital

German Woman Dies in First Known Death From a Cyber Attack on a Hospital The first known death from a cyberattack was reported on Thursday (Sept 17) after cybercriminals hit a hospital in Dusseldorf, Germany, with so-called ransomware, in which hackers encrypt data and hold it hostage until the victim pays a ransom. The ransomware

5 Common Sections in an Agreement Form Example

5 Common Sections in an Agreement Form Example Whatchamacallit: Agreement or Contract? The terms ‘agreement’ and ‘contract’ are often used interchangeably, but if we look at both words through legal-coloured glasses, they are not quite the same. So before we dive into the 5 common sections in an agreement form example, we must get some

Limiting Location Data Exposure: 8 Best Practices

If you’re like me who grew up consuming spy movies, you would have already been familiar with the notion of geolocation trackers in all sorts of digital devices (which both heroes and villains can use to their advantage). On the flip side, you would also have gotten hold of some tips on limiting location data

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us