Skip to main content

Share: Two-Factor Authentication (2FA)

2FA works by adding an extra layer of security to your account. It requires an extra login credential to gain account access, and getting that second credential requires access to something you own, something you are or something you know. For example fingerprint.

Common 2FA methods:
1. Text Message - Receive a login code (SMS).
2. 2FA Application - Mobile application that generates an authentication code.
3. Bio-metric - This method requires you to physically present something to gain access to your account. Common methods of bio-metric verification include retina scans and fingerprint.

An account that uses 2FA is much more secure than a mere username and password login, but that doesn’t mean it is 100% safe.You may lose access if you lose your phone or unable to receive the login code if your phone number is inactive. Mobile number portability is an opening for hackers to impersonate you and switch your number. Others may be able to use or access to your device (apps) when it is unattended while at work or losing it while traveling. Hackers may be able to hack your device (apps).

It is recommended that users always activate 2FA whenever it is available. And remember to always have at least one back-up method just in case the main 2FA method is not working / failed, you are still able to get the login code / access. Common back-up methods are: back-up phone number and generate a one time back-up code and save / place it someway safe.

Popular posts from this blog

Share: Money Game

Money game schemes, also known as 'Skim Cepat Kaya', are schemes dressed up as an investment-platform. They look legitimate but in fact they are illegal. Often, they falsely promise much higher interest rates, returns or profits to attract potential victims. They have no intention to uphold their promises. They seek to lure new victims. They use the new depositors' money to repay the earlier depositors. Eventually, these money game schemes will collapse and the depositors will lose their investments and money. Members of these money game schemes will approach the victims at various locations. They normally come with luxury cars to convince the victims. During sharing, they will emphasize someone to be successful after joining the investment scheme. Remember: * Only deposit and invest with parties licensed by the authorities. * When in doubt, check with Bank Negara Malaysia, the Securities Commission or other relevant authorities about a company before making any decision.

Share: DDoS

Distributed denial of service (DDoS), happens when attackers send requests to a target’s IP address, causing the server or network to become overwhelmed, resulting in a denial-of-service to normal traffic. Symptoms of a DDoS attack: - a site or service is suddenly very slow or unavailable - suspicious amounts of traffic from a single IP or IP range - suspicious amounts of traffic from users who share the same profile, device, etc - odd traffic patterns, spikes at odd hours, etc Some methods to reduce or even to prevent DDoS: - monitor web traffic - restriction (for example country) - use cloud - increase bandwidth - have plans (for example security plans)

Share: A.I. Chat

Artificial Intelligence (AI) chat, often referred to as A.I. chat or chatbots, represents a revolutionary approach to human-computer interaction. It involves the use of advanced algorithms and machine learning techniques to enable computers to engage in natural language conversations with users. A.I. chat systems have become increasingly prevalent in various applications, ranging from customer support and virtual assistants to educational tools and entertainment platforms. Evolution of A.I. Chat: The roots of A.I. chat can be traced back to early attempts at creating conversational agents, such as ELIZA in the 1960s. These early systems relied on rule-based approaches and predefined scripts to simulate conversations. Over the years, advancements in natural language processing (NLP) and machine learning have transformed A.I. chat into more sophisticated and context-aware systems. Key Components of A.I. Chat: * Natural Language Processing (NLP): NLP is a critical component ...