Have some tips? Write it down and share it to your friends!
Click Login Now button to start!
Be cautious about the personal information you share online. Even seemingly harmless details can be exploited for social engineering attacks. Protect your data by sharing only what’s necessary and keeping your privacy in mind.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
October 10, 2024 21:55 (on 10/11/24) | 0 | QR Ready | 1 minute read
Google is launching a new pilot program in India to automatically block the sideloading of potentially harmful Android apps from third-party sources, following similar tests in Singapore, Thailand, and Brazil. The feature aims to protect users from apps that request sensitive permissions often exploited for financial fraud, such as accessing SMS messages or using accessibility services for malicious activities.
The initiative will start next month and will be gradually rolled out across all Android devices with Google Play services in India. Google has already blocked nearly 900,000 high-risk app installations in Singapore since the program's launch earlier this year.
Eugene Liderman, Google's Director of Mobile Security Strategy, said the feature will automatically prevent risky installations by analyzing app permissions in real-time. Developers are advised to review their app permissions to ensure compliance with the new rules.
This comes nearly a year after...
October 9, 2024 19:43 (on 10/9/24) | 0 | 1 minute read
Verify the caller's identity before sharing personal information. If suspicious, hang up and call back using a trusted number. Beware of pressure tactics or urgent requests. Trust your instincts to protect yourself from vishing scams.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
October 9, 2024 19:37 (on 10/9/24) | 0 | QR Ready | 1 minute read
Are you an active social media user? While sharing life moments can be fun, be aware of the risks, especially regarding work-related information.
To protect yourself from hackers:
- Be cautious about what you share; avoid sensitive job details.
- Limit job-related posts.
- Review your privacy settings to safeguard your organization.
By thinking carefully about your online posts, you can protect your job and reputation.
October 8, 2024 21:34 (on 10/9/24) | 0 | QR Ready | 1 minute read
Always scrutinize the sources of information shared online to prevent spreading misinformation that could harm your organization. Verify facts and check credibility before sharing to maintain integrity and trust.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
October 8, 2024 19:26 (on 10/8/24) | 0 | QR Ready | 1 minute read
Verify identities before discussing sensitive information, even with colleagues. Keep documents secure and out of sight. Avoid leaving sensitive information unattended in public spaces. By assuming potential threats, you can reduce the risk of data breaches.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support
October 7, 2024 21:45 (on 10/8/24) | 0 | QR Ready | 1 minute read
Be cautious with online quizzes and surveys that request personal information. Sharing details like your name, email, or even more sensitive data can lead to identity theft or unwanted spam. Always prioritize your privacy and think before you share.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
October 6, 2024 19:53 (on 10/6/24) | 0 | QR Ready | 1 minute read
Regularly review your account activity logs for any unusual access patterns or unauthorized login attempts. This practice helps you catch potential security breaches early and protects your information from unauthorized access
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.
October 3, 2024 21:15 (on 10/4/24) | 0 | QR Ready | 1 minute read
A large fraud scheme has been uncovered, involving fake trading apps on the Apple App Store and Google Play Store, along with phishing websites. This was reported by Group-IB.
This scam is part of a consumer investment fraud scheme known as "pig butchering." In this scheme, scammers trick people into investing in cryptocurrency or other financial products after gaining their trust, often pretending to be romantic partners or investment advisors.
These deceptive tactics usually lead to victims losing their money. In some cases, the scammers even ask for more money through various fees and payments.
Group-IB, a company based in Singapore, noted that this scam has affected people worldwide, with victims in Asia-Pacific, Europe, the Middle East, and Africa. The fake apps, made with a tool called UniApp Framework, are referred to as UniShadowTrade.
Source: Fake Trading Apps Target...
October 2, 2024 19:39 (on 10/2/24) | 0 |
1 minute read
Set your devices to automatically lock after a short period of inactivity. This step prevents unauthorized access and helps protect your data from prying eyes. Whether stepping away for a moment or leaving your device unattended, an auto-lock feature serves as a crucial line of defense.
Do you have a question? Submit a ticket at [PB8324.3] Data Security Support
October 2, 2024 19:31 (on 10/2/24) | 0 | QR Ready | 1 minute read