Emerging Threats
Home > 
Emerging Threats
< back
Result: Item(s)
Protecting Children from Online Threats
When children go online, they face new dangers and need more protection. Examples of the risks are: privacy of software and music, disclosure of personal information, spyware, illegal downloads, spam emails and so on.
Guidelines for Using Software
A wide range of software can provide tools for ensuring information security.
Security Incident Handling for Companies
An Information Security Incident is an adverse event in an information system and/or a network that poses a threat to computer or network security in respect of availability, integrity and confidentiality.
Handling Malware Outbreak
Given that attackers are now moving away from attacks that are merely a nuisance or destructive towards activity that is motivated by financial gain, malicious code attacks have become more sophisticated and a significant concern to organisations.
Avoiding Phishing Websites
Try to avoid visiting phishing websites that imitate sites of well-known organisations. These are purposely setup to collect sensitive information from visitors, such personal information, usernames and passwords, in a fraudulent manner. This type of activity is notorious, and is known as phishing.
Playing Online Games Safely
Many computer and console video games can be played online against other players over the Internet. Players are allowed to communicate sometimes using text messages typed into the computer and sometimes using a microphone.
Avoiding Phone Fraud
Criminals also use the phone, and especially Internet phone systems, to trick people.
Securing Your New PC
Don't forget to implement necessary security measures when you set up your new PC at home. Just taking a new computer out of the box and connecting it to the Internet is not safe. You are exposing your PC to a number of security risks, such as virus and malicious codes infection, spam emails, denial of service attacks, disclosure of personal or sensitive information and so on.
Protecting against Malware
The best practices can protect your computer(s) more effectively against malware attacks
Phishing
Phishing emails often look 'official', some recipients may respond to them and click into malicious websites resulting in financial losses, identity theft, and other fraudulent activity.