Close this search box.

Protecting your child from sexual abuse

CSAM stands for Child Sexual Abuse Material. It refers to any visual depiction, including images or videos, that depicts sexually explicit conduct involving a minor, which is defined as anyone under the age of 18. CSAM is also commonly referred to as child pornography, although the term “child pornography” is considered outdated and has been […]

Beware of Parcel Scams

Fake parcel scams are a type of fraud in which scammers send fake messages, emails or phone calls pretending to be a legitimate delivery company or postal service, informing the recipient that they have a package waiting for them, and asking them to pay a fee or provide personal information to retrieve it. The scammer […]

Being a better Digital Journalist

Digital intelligence in the context of journalism refers to the ability of journalists and news organisations to effectively navigate and leverage digital technologies and platforms to gather, analyse, produce, and distribute news content. It involves utilising various digital tools, techniques, and strategies to enhance the overall journalistic process and adapt to the changing media landscape. […]

Safeguard your personal data

Data protection refers to the practices and technologies used to safeguard sensitive and personal information from unauthorised access, use, disclosure, modification, or destruction. It involves a range of measures, including technical, organisational, and legal steps, to ensure that data is kept safe and secure at all times. Our personal digital rights as per GPDR include […]

Don’t get tricked by Fake DP

A display picture, also commonly referred to as a profile picture or avatar, is an image that represents a user’s identity on social media channels. It is the image that appears next to a user’s name whenever they post, comment, or engage with content on the platform. It serves as a visual identifier and helps […]

Beware of Movie Rating Frauds

Movie review or rating fraud is a deceptive practise where individuals or groups manipulate movie ratings or reviews for various purposes, such as financial gain, promoting or defaming a film, or influencing public perception. While it is not uncommon for people to have different opinions about movies, fraudulent activities can artificially inflate or deflate ratings, […]

Chat GPT in Security

ChatGPT is a type of language model that utilises advanced machine learning techniques to understand and generate human-like text. It is based on the GPT (Generative Pre-trained Transformer) architecture and has been trained on a large dataset of conversational text. ChatGPT is designed to be fine-tuned for a variety of conversational AI tasks, such as […]

Growing concerns around deepfakes

Deepfakes are a type of artificial intelligence-based technology that allows for the creation of highly realistic digital forgeries, in which an individual’s face and/or voice is replaced with someone else’s. This technology can be used to create convincing videos of real people doing or saying things they never did. Deepfakes are a growing concern because […]

Task based WFH Job Frauds

Here are a few indicative task-based part-time job scams offered on social media and messenger services. (a) Free work-at-home opportunities (b) high-paying for likes and reviews (c) Phony social media influencers use investment and earning opportunity seminars. (d) part-time jobs with full-time pay via SMS, WhatsApp, and social media advertisements (e) Reseller opportunities with initial […]

Beware of Spoofing

Spoofing is the act of falsifying or disguising one’s identity or data to appear as something or someone else. It can refer to various types of deception in computer networking, including e-mail spoofing, IP spoofing, caller ID spoofing and website spoofing. Spoofing can be a serious threat to security and privacy, and it’s important to […]