Most organisations will never ask for your sensitive information such as NRIC, login credentials and credit card details to be sent over the Internet.
If the sender claims to be from your bank and requests for your account number, it should raise a red flag immediately.
When in doubt, contact the company directly to clarify, but do not to use the contact information provided in the email!
Something’s Phishy? Dive Deeper!
4 912 days ago
As your home is getting smarter and more connected (think IoT - Internet of Things) you should consider not only the convenience your smart hairdryer, fridge or baby monitor brings, but also - security risks. As those devices are connected to your home network and is a potential way to access more than you’d like to give away - there are a few easy steps to follow for a better security. Imagine if someone would access your devices or data to spy on you or find out when you’re not at home. That sounds scary. Sadly, security hasn’t been on top of the list for majority of connected devices manufacturers, therefore you should be aware of that and do a bit extra: 🎈Create strong passwords for your Wi-Fi and devices: again, here we have the importance of strong and unique passwords which are hard to guess and are combined of letters, numbers and symbols, and not your name and address. 🎈Update your software: this can be a mundane and boring task, but overall it’s one of the most important ones. Software updates can usually be issued to fix security related issues so don’t postpone it and do update regularly. 🎈Change your router name: every IoT device model has a manufacturer name which can be found out easily. Change its name to something more complicated and keep it for yourself. 📸@element5digital
It’s time to introduce another one of our mascots so...... everybody meet PUFFY!!!! He’s notorious for deceptive phishing so don’t let Puffy fool you! He uses his seemingly harmless nature to lure unsuspecting victims then POOF! You’re left lost and emptied YIKES
OH and we wanna give a special shoutout to @keithlings for suggesting this name!! And thank you to the rest who responded as well, there were some pretty creative ones and we had a tough time deciding!
Performing some memory forensics on a WINXPSP1x64 while reading one of my favorite reference books. The framework & tool of choice I decided to use was Volatility. Generally when we get memory dumps from an OS, we are looking for malicious behavior, then to the extract that file, and perform further analysis on what had happened. These events are almost needle in the haystack types as there truly is only one in and one way out. ➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖ So what is memory forensics? It’s the analysis of volatile data in a computer’s memory dump. Volatile data is the data stored in temporary memory on a computer while it is running. When a computer is powered off, volatile data is lost almost immediately. Volatile data resides in a computer’s short term memory storage and can include data like browsing history, chat messages, and clipboard contents.