Barely a week goes by without a report of a massive data breach or another cyberattack that’s exposed sensitive user data or disrupted services.
Even as they occur like clockwork, most people aren’t aware of the tactics employed by hackers, which are evolving over time.
Already a subscriber? Log in
Play, subscribe and stand a chance to win prizes worth over RM39,000! T&C applies.
Cancel anytime. Ad-free. Unlimited access with perks.
