Sunday, September 9, 2018

E-government towards a better society


                          Related image


               What is e-government? E-government is the use of information and communication technologies (ICT) to improve the activities of public sector organizations. Many countries are trying to implement or catch up with the latest trend to cater to their peoples' needs and wants. Simply put, there are times when a message needs to be delivered fast to the citizen, by using the e-government this would be easier.
              Referring to Malaysia, there are many initiatives already being implemented to ensure that the jobs are being done effectively by the public sectors employees. This makes the life of the citizens easier. For an example, the e-service provision whereby citizens can make their payment via mobile payments 24/7. Every 'rakyat' wants these changes to be done by all departments to eliminate redundancy and the hassle to wait at the kiosks or the payment counters. The new digital Malaysia promises all these for their citizens.
              There are many benefits to for e-government to commence. Firstly, it will improve the overall governance of the country. It allows the public services to design an effective model to execute the policies. Secondly, the public sector's goals can be achieved without hassle and delay. In align to this, the services catered to the citizens will be more improvised and more faster responses can be given to them.
              In conclusion, it is necessary for all countries in this world to implement the e-government. Due to the technology, there are many apps being used by all and this makes their work faster and simple. The deliverance of the results through e-government is impeccable.

https://www.enterpriseitnews.com.my/a-new-digital-malaysia/
     

Phishing: A new type of cyber crime


Phishing: A new type of cyber crime


Image result for phishing articles 2017There’s a new type of Internet piracy called “phishing.” It’s pronounced “fishing,” and that’s exactly what these thieves are doing: “fishing” for people’s personal financial information.
Phishing is a cyber-crime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

Phishing is when a scammer uses fraudulent emails or texts, or copycat websites to get people to share valuable personal information – such as account numbers, Social Security numbers, or people’s login IDs and passwords. Scammers use anyone’s   information to steal their money or identity or both.

Types of phishing

That said, there are a variety of techniques that fall under the umbrella of phishing. Generally, a phishing campaign tries to get the victim to do one of two things:
-       Hand over sensitive information. These messages aim to trick the user into revealing important data — often a username and password that the attacker can use to breach a system or account. The classic version of this scam involves sending out an email tailored to look like a message from a major bank; by spamming out the message to millions of people, the attackers ensure that at least some of the recipients will be customers of that bank. The victim clicks on a link in the message and is taken to a malicious site designed to resemble the bank's webpage, and then hopefully enters their username and password. The attacker can now access the victim's account.

-       Download malwareLike a lot of spam, these types of phishing emails aim to get the victim to infect their own computer with malware. Often the messages are "soft targeted" — they might be sent to an HR staffer with an attachment that purports to be a job seeker's resume, for instance. These attachments are often .zip files, or Microsoft Office documents with malicious embedded code. The most common form of malicious code is ransomware — last year it was estimated that 93 percent of phishing emails contained ransomware attachments.

how phishing works?

In a typical case, users will receive an e-mail that appears to come from a reputable company that you recognize and do business with, such as users’ financial institution. In some cases, the e-mail may appear to come from a government agency, including one of the federal financial institution regulatory agencies.
The e-mail will probably warn users of a serious problem that requires their immediate attention. It may use the phrases, such as “Immediate attention required,” or “Please contact us immediately about your account.” The e-mail will then encourage users to click on a button to go to the institution’s Web site.
In either case, users may be asked to update their account information or to provide information for verification purposes: i.e., Social Security number, account number, password, and place of birth.
How to protect from phishing
 I.          Never provide personal information in response to an unsolicited request, whether it is over the phone or over the Internet.
II.          If it’s seems the contact may be legitimate, have contact the financial institution immediately. Users can find phone numbers and Web sites on the monthly statements they receive from the financial institution
III.          Never should not provide password over the phone or in response to an unsolicited Internet request. A financial institution would never ask users to verify their account information online.
IV.          Review account statements regularly to ensure all charges are correct.

Source: https://www.zdnet.com/article/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more/

Identity theft

               Identity theft had caused many problems to everyone. Internet users have to be cautious of hackers and fraudsters when th...