-
There's A Scam That Could Cost You Thousands Of Ringgit With Just One Phone Call
It is known as 'One Ring' or 'Wangiri' scam.
-
This PJ High School Is Now Recording Fingerprints Of Students For Attendance
Currently 6 scanners are in place and have been separated by gender.
-
WhatsApp Is Giving Your Phone Numbers To Facebook. Here's How You Can Stop It
Big changes are coming to WhatsApp.
-
What Happens To Your Google Account When You're On Pokémon GO
It's a potentially disastrous security risk.
-
Facebook And Google Have Been Using Your Phone To Secretly Listen To Whatever You Say
Here's how to stop them from doing so in future.
-
IGP Wants To Monitor Our WhatsApp Because "Immature Malaysians Make Overzealous Comments"
According to Malaysia's top-cop, IGP Tan Sri Khalid Abu Bakar, Malaysians tend to be ‘overzealous’ when using sites like Facebook, often causing public unrest.
-
This Messaging App Was Created For Anyone With Concerns Over Privacy Infringement
It also boasts a military-grade encryption, so hackers won't stand a chance!
-
Harith's son's photos removed from porn site after swift response by MCMC
"It's both disgusting and incredibly disturbing."
Updated from: A Father's Worst Nightmare: Photos Of Harith's Son And Other Kids Found On Porn Sites
-
Twitter Now Knows Which Phone Apps You've Installed But You Can Opt Out
Twitter is launching the "App Graph". Find out what it means should you not opt out of it.
-
What Do Viruses, Trojans, Worms, And Malware Actually Do?
While we all know viruses and trojans are bad, how exactly they work and what do they do to our computer system is not much known about. In the 24th instalment of our weekly TECH TUESDAY column, we look at viruses, trojans, worms, spyware, and other malware to explain their role.
-
While Five Million 'Gmail Passwords' Were Leaked, Here's Why You Shouldn't Panic
Nearly 5 million usernames and passwords associated with Gmail accounts have been leaked on a Russian Bitcoin security forum. Here's everything you need to know about it.
-
Researchers Successfully Test How To Steal Data From Laptop By Simply Touching It
Hackers have a new potential method for extracting data from computers at their fingertips—literally.
Results for #privacy