How EASY & HACKABLE Is Your Life ??

If you’re reading this, there’s 69 percent chance you will become a victim of hacking at some point in your lifetime. And if you think protecting yourself is as easy as changing a couple passwords and installing some anti-virus software, you’re 100 percent wrong.

Luckily, the paranoia-inducing infographic below will whip you into shape, stat. Find out how hackers gain access to your information, all the scary things they can do with it, and what you can do to protect yourself.

Read more… “How EASY & HACKABLE Is Your Life ??”

Private Eye at Work- Baekk Punya Sapu Losyen !!!

Baek Punya Sapu Losyen
Baek Punya Sapu Losyen

Datin Sri Angie (bukan nama sebenar) adalah seorang suri rumah sepenuh masa yang mempunyai 4 orang cahaya mata hasil daripada 32 tahun perkahwinan dengan Dato’ Sri Timmy Thomas (bukan nama sebenar)  . Keempat-empat anak beliau telah pun dewasa di mana 3 daripadanya telah pun berkahwin dan mempunyai anak masing-masing manakala anak bongsu beliau baru sahaja tamat pengajian di kolej swasta terkenal di ibu negara.

Read more… “Private Eye at Work- Baekk Punya Sapu Losyen !!!”

Useful Guide to Secure Your Instagram Account

Instagram is a fun way to explore your creative side while taking photos and sharing them with friends. At the same time, it is a good platform to spread and deliver your photos to unknown people you choose to add to your circle of friends or, by using the hashtag option, you can make them accessible to people from all over the world.

We take our social media knowledge for granted and because of this, we usually have no fears on our security or privacy.

Before we present the options offered by the Instagram account, we need to mention a few common sense rules we all need to follow by answering some simple questions:

Since your friends already know who you are, why should you use your real name? And do you really need to expose your location, your school name or your work place?

For this reason, before we post a new photo on Instagram or let our children use this social media network, we should know what security and privacy options are available to us and how we can use them in order to increase our online protection.

Read more… “Useful Guide to Secure Your Instagram Account”

Top 9 Signs You’ve been HACKED !!

1: Redirected Internet searches
2: Unwanted browser toolbars
3: Fake antivirus messages
4: Frequent random pop-ups
5: Your friends receive fake emails from you
6: Your online passwords suddenly change
7: Unexpected software installs
8: Your mouse moves between programs and makes correct selections
9: Your anti malware software, Task Manager, or Registry Editor is disabled and can’t be restarted

Most malicious hacking originates from 1 of 3 vectors: unpatched software, running Trojan horse programs, & responding to fake phishing emails. Take note of it and you’ll be less likely to have to rely on your anti malware software’s accuracy.

Top 10 Most Popular Facebook Scams

Twenty percent of the world’s population is “on” Facebook—that’s well over a billion people.

Top 10 Most Popular Facebook Scams

  1. Profile visitor stats. It’s all about vanity. It doesn’t take long for any new Facebook user to see an ad offering to reveal how many people are viewing your profile. You can even find out who’s viewing. It must make a lot of FB users feel validated to know how many people are viewing them and just whom, because this scam comes in at the top.Is it really that important to know how many people are viewing your profile? Even if your self-worth depends on this information, Facebook can’t provide it. These ads are scams by hackers.
  2. Rihanna sex tape. What a sorry life someone must be leading to be lured into clicking a link that promises a video of a recording star having sex. Don’t click on any Rihanna sex tape link, because the only intimacy you’ll ultimately witness is a hacker getting into your computer
  3. Change your profile color. Don’t click on anything that relates to changing your FB profile color. Facebook is blue. Get over it. You’ll never get red, purple, pink, black, grey, white, red, orange or brownish-magenta. Forget it. Deal. If you see this offering in your news feed, ignore it. It’s a scam.
  4. Free Facebook tee shirt. Though this offering seems quite innocuous, anyone who never rushes to click things will realize that this can’t possibly be legitimate. Do you realize how much a billion tee shirts cost? Even if you don’t know that one-fifth the world’s population uses Facebook, you should know that an enormous number of people use it and they aren’t getting a t-shirt.a. Where would Facebook get the money to 1) produce all those tee shirts (even if one-tenth of FB users wanted one, that’s still a LOT of money), and 2) mail the shirts out, and 3) pay reams of people to package the shirts and address the packages? People, THINK before you click! See your top 10 Facebook stalkers. This is just so funny, how can anyone take it seriously and be lured into clicking it?
  5. See your top 10 Facebook stalkers. This is just so funny, how can anyone take it seriously and be lured into clicking it?
  6. Free giveaways. It’s cliché time: Nothing’s free in this world—certainly not on Facebook. End of story.
  7. See if a friend has deleted you. This, too, sounds suspicious. And besides, is it really that important if a “friend” has deleted you? Do you even personally know every individual who has ever friended you? This feature does not exist. You’re better off pretending that nobody would ever want to delete you because you’re so special! But actually, there are plug-ins available that perform this function, but still, stay away.
  8. Find out who viewed your profile. Again, here’s a scam that works well on people who have too much time on their hands. This function doesn’t exist on Facebook.
  9. Just changed my Facebook theme and it’s rad! Ignore this at all costs.
  10. Tragedy of the day. Whenever there is something horrific going on such as Mother Nature getting all murderous or some man made disaster or even a celebrity dying, you can be sure Facebook scammers are on top of the breaking news with a “video” or “photo” that simply isn’t. Just don’t click it.


6 Ways to Secure Your Email Account

On August 30th, 1982, a copyright for a Computer Program for Electronic Mail System was issued to Shiva Ayvadurai. Thus, email was born. 32 years later, email has become an essential part of our lives. Emails are a must-have item, allowing us to connect and share information with friends, teachers, and co-workers.

To celebrate email’s birthday, here are 6 ways to secure your email account.

Read more… “6 Ways to Secure Your Email Account”

Private Investigator-The Divine Within

1. As I was reading the Holy Quran today, I passed through verse 104 of Surah Al Imran as below:

surah al imran
Let there arise out of you a band of people inviting to all that is good, enjoining what is right, and forbidding what is wrong: They are the ones to attain felicity.

2. All of a sudden, it struck my mind, does being a private investigator qualify me to be in this group of blessed people? If it is, I’m grateful that I have such a noble job and for that whatever the price that I need to pay to be a good and blessed private investigator, all the obstacles and challenges along the way will be the one that are worth facing.

3. To those who has been in the industry and to those who is considering this profession as their career, if you are a Muslim, be steadfast, guided by integrity and principles, also always remind yourself that everything that you do to search for truth and justice, one thing for sure is you’ll be rewarded if not in this life, it will in the life after.

Pak Wan

Private Investigator at Work-Surveillance Detection

Surveillance Detection

Terrorist attacks follow a distinct process referred to as the Terrorist Attack Cycle.  The terrorist attack cycle includes:  Target selection, planning, deployment, escape and exploitation.  Regardless of the type of attack whether it be terrorist such as a bombing or kidnapping or a criminal attack such as a theft there is almost always some amount of preoperational hostile surveillance conducted.  This hostile surveillance is intended to assess a potential target for value, security measures and vulnerabilities and it’s during this phase that terrorists and other attackers are vulnerable to detection.

Read more… “Private Investigator at Work-Surveillance Detection”