top of page
eVantage Technology - Latest Stories
Search

-
Jul 29, 20214 min read
How to prevent Online Impersonation
I have a curious question for y’all. Who is your role model? Who is that someone whom you want to be, or hope to one day grow to become?...

-
Jul 22, 20213 min read
Your 2021 Cybersecurity Habits
Another year of COVID-19, but still the same cybersecurity hacks. In fact, cybercrime is continuing on a rampant incline and shows no...

-
Jul 15, 20213 min read
The Jane Doe Case: Making Safe Payments Online
What do y’all think of the name Teddy for a dog? Ok, close your eyes and imagine a cute small white-ish mini labradoodle or poodle with a...

-
Jul 8, 20213 min read
The Jane Doe Case: When To Trust Others Online
Do you like dogs? I like dogs, especially those small mini ones. In fact, I have already decided that if I were to get a dog in the...

Therese Park
Mar 18, 20214 min read
What is a Man-in-the-middle Attack?
What is a Man-in-the-middle Attack (MitM)? A man-in-the-middle attack requires three players. There’s the victim, the party with which...

-
Mar 11, 20217 min read
The Key to Stopping Cyber Attacks
Let me tell you something. The thing that people most often misunderstand about cyber attacks is that they don’t happen at the speed of...

Therese Park
Mar 4, 20212 min read
How do Hackers commit Cyber Crime?
The key is this: if you want to stop a hacker, you got to think like a hacker! So what are some of the psychological techniques used by...

-
Feb 18, 20216 min read
How to Survive an Email Bomb Attack
It is a Monday morning. You have grabbed your morning coffee, sat at your desk, and switched on your work computer. You open your work...

-
Nov 12, 20204 min read
How to stay safe on Public WiFi
Getting Internet access in public areas has never been easier. No matter if you are a business traveler, a student, an employee, etc.,...


-
Nov 5, 20204 min read
How to Protect Yourself from a Data Breach?
You must have heard the recent news this past weekend – 1.1 million RedMart accounts were stolen from e-commerce platform Lazada and sold...


Therese Park
Oct 1, 20204 min read
The Importance of Investing in Cybersecurity Right Now
Let me ask you this, doesn’t it seem like new major cybersecurity breaches are happening almost every day? Of course, the bigger the...


Therese Park
Aug 27, 20207 min read
11 Cybersecurity Myths you need to Stop Believing to Protect your Business
Cybersecurity preparedness is one of the major obstacles businesses are facing today. Yet, despite the increased focus on making...

Therese Park
Jul 30, 202010 min read
12 Common Scams in Singapore
Tell me if this is not true. You probably have read many stories about people being scammed in Singapore. But here’s the thing. You...


Therese Park
Jul 23, 20204 min read
How to Spot Signs of Phishing
This article was taken from the Cyber Security Agency of Singapore (CSA). When you learn to spot the signs of phishing, you can better...


Therese Park
Jul 16, 20209 min read
How to Work-From-Home Securely
COVID-19 has indeed turned what used to be our “normal”, one eighty! And in response to this pandemic, everyone had been suddenly and...


Therese Park
Jun 18, 20203 min read
How to Spot a Fake App
As governments around the globe scramble to launch contact tracing to accurately map the transmission of COVID-19 amongst their citizens,...


-
Jun 4, 20204 min read
How to Stay Safe from Fake Domain Registrations and COVID-19 Scams
Circuit breaker might have ended, but COVID-19 scams have not. The reality is this, scammers are way smarter than we give them credit...

Therese Park
May 14, 20204 min read
3 Tips to Protect your Passwords
Each year on the first Thursday in May, World Password Day promotes better password habits. And last Thursday, 7 May 2020, was no...

-
Aug 8, 20195 min read
Pen Test: The Why, The When and The How
Imagine it is midnight, and you already got under the covers and switched off the lights, when suddenly, you thought to yourself “Did I...

-
Dec 8, 20162 min read
Smells Phishy? Here’s some IT security tips.
IT Security is increasingly important this year. A shocking statistic by the Anti-Phishing Working Group (APWG), reported that the...


-
Jul 19, 20122 min read
Let Me Tell You the Password to My Bank Account
“Through 20 years of effort, we’ve successfully trained everyone to use passwords that are hard for humans to remember, but easy for...
bottom of page