Sunday, September 9, 2018
E-government towards a better society
What is e-government? E-government is the use of information and communication technologies (ICT) to improve the activities of public sector organizations. Many countries are trying to implement or catch up with the latest trend to cater to their peoples' needs and wants. Simply put, there are times when a message needs to be delivered fast to the citizen, by using the e-government this would be easier.
Referring to Malaysia, there are many initiatives already being implemented to ensure that the jobs are being done effectively by the public sectors employees. This makes the life of the citizens easier. For an example, the e-service provision whereby citizens can make their payment via mobile payments 24/7. Every 'rakyat' wants these changes to be done by all departments to eliminate redundancy and the hassle to wait at the kiosks or the payment counters. The new digital Malaysia promises all these for their citizens.
There are many benefits to for e-government to commence. Firstly, it will improve the overall governance of the country. It allows the public services to design an effective model to execute the policies. Secondly, the public sector's goals can be achieved without hassle and delay. In align to this, the services catered to the citizens will be more improvised and more faster responses can be given to them.
In conclusion, it is necessary for all countries in this world to implement the e-government. Due to the technology, there are many apps being used by all and this makes their work faster and simple. The deliverance of the results through e-government is impeccable.
https://www.enterpriseitnews.com.my/a-new-digital-malaysia/
Phishing: A new type of cyber crime
Phishing: A new type of cyber crime
There’s a new type of Internet piracy called
“phishing.” It’s pronounced “fishing,” and that’s exactly what these thieves
are doing: “fishing” for people’s personal financial information.
Phishing is a cyber-crime in which a target or targets are contacted by email,
telephone or text message by someone posing as a legitimate institution to lure
individuals into providing sensitive data such as personally identifiable
information, banking and credit card details, and passwords.
Phishing is when a scammer uses fraudulent emails or
texts, or copycat websites to get people to share valuable personal information
– such as account numbers, Social Security numbers, or people’s login IDs and
passwords. Scammers use anyone’s information to steal their money or identity
or both.
Types of phishing
That said,
there are a variety of techniques that fall under the umbrella of phishing. Generally,
a phishing campaign tries to get the victim to do one of two things:
-
Hand over
sensitive information. These
messages aim to trick the user into revealing important data — often a username
and password that the attacker can use to breach a system or account. The
classic version of this scam involves sending out an email tailored to look
like a message from a major bank; by spamming out the message to millions of
people, the attackers ensure that at least some of the recipients will be
customers of that bank. The victim clicks on a link in the message and is taken
to a malicious site designed to resemble the bank's webpage, and then hopefully
enters their username and password. The attacker can now access the victim's
account.
-
Download
malware. Like a lot of spam, these types of phishing emails aim to get the victim
to infect their own computer with malware. Often the messages are "soft
targeted" — they might be sent to an HR staffer with an attachment that
purports to be a job seeker's resume, for instance. These attachments are often
.zip files, or Microsoft Office documents with malicious embedded code. The
most common form of malicious code is ransomware — last year it was estimated
that 93 percent of
phishing emails contained ransomware attachments.
how phishing works?
In a typical case, users will receive
an e-mail that appears to come from a reputable company that you recognize and
do business with, such as users’ financial institution. In some cases, the
e-mail may appear to come from a government agency, including one of the
federal financial institution regulatory agencies.
The e-mail will probably warn users of a
serious problem that requires their immediate attention. It may use the
phrases, such as “Immediate attention required,” or “Please contact us
immediately about your account.” The e-mail will then encourage users to click
on a button to go to the institution’s Web site.
In either case, users may be asked to update their
account information or to provide information for verification purposes: i.e., Social
Security number, account number, password, and place of birth.
How to protect from
phishing
I.
Never provide personal
information in response to an unsolicited request, whether it is over the phone
or over the Internet.
II.
If it’s seems the
contact may be legitimate, have contact the financial institution immediately. Users
can find phone numbers and Web sites on the monthly statements they receive
from the financial institution
III.
Never should not
provide password over the phone or in response to an unsolicited Internet
request. A financial institution would never ask users to verify their account
information online.
IV.
Review account
statements regularly to ensure all charges are correct.
Subscribe to:
Posts (Atom)
Identity theft
Identity theft had caused many problems to everyone. Internet users have to be cautious of hackers and fraudsters when th...
-
Internationalisation is a level that most companies hope to achieve amidst its plans of expansion. Being a global player in ones area of e...