Stay Tuned!

Subscribe to our newsletter to get our newest articles instantly!


Don’t Fall for the Trickery: Understanding Social Engineering and How to Protect Yourself

What is Social Engineering Social engineering involves manipulating people into revealing confidential information or doing things that may not be in their best interest. It is a tactic often used by attackers. It is a psychological manipulation that exploits human trust and social norms to achieve a desired outcome. According to ZD-Net, organisations face an average […]

Feature Security

How to Make Apple iPhone/iPad More Secure

  • 4 November 2022

Background With the latest data breach news of the telco company lately, users are concerned about security. They do banking via phone and have a lot of questions about making their phone or tablet more secure from external malicious. Apple’s closed system is designed to work only inside set parameters that can communicate to other […]


How Secure is the Email Connection from End to End

  • 5 July 2022

Background There was a perception the email was somehow not secure end to end, and the hacker could sniff around the email package. Solution Most of the email servers, the hosted one especially, implemented the Transport Layer Security (TLS), a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely […]


Unmasking the Website Defacement Attack

Background We found weird behaviour on our websites as the link could not go to the proper URL with the domain; in fact, it went to a third-party link. That’s quite alarming. We then checked Google Analytics, and the traffic went down. There was something not right here! Last updated – 21/01/2023: Add the Update […]


How to Install the Kali Linux on Windows 11 via Hyper-V

  • 20 February 2022

Environment These are the current environment: Custom PC machine with AMD Chip and Gigabyte motherboard. Microsoft Windows 11. Kali Linux Open up a browser and go to On the top navigation, click the Get Kali option. Select the Bare Metal option below. Ensure to the iso download the 64-bit Installer option. Hardware Virtualisation Need […]