Skip to main content

Home/ Digiteen/ Contents contributed and discussions participated by Ahmed Kiyoshi El Maghraby

Contents contributed and discussions participated by Ahmed Kiyoshi El Maghraby

Ahmed Kiyoshi El Maghraby

Super safe hard - 0 views

  • * of networked storage to business users searching for the easiest and most technologically advanced way to share, secure and protect their most important data, including productivity application data, media files, backup data, and other digital files.
Ahmed Kiyoshi El Maghraby

eWay security - 1 views

  • With business suddenly booming, the company tapped the services of Macquarie Hosting to ensure customer data was encrypted and firewalls were secure.
  • Compliance with the data security standard has opened the door to billions of dollars worth of business, according to Macquarie Telecom hosting managing director Aidan Tudehope.
Ahmed Kiyoshi El Maghraby

credit cards cloned - 0 views

  • Using tiny technology disguised as part of the machine, the thieves then press new cards with customers' numbers and run amok
Ahmed Kiyoshi El Maghraby

stolen credit cards - 0 views

  • stolen card information is being sold on the black market
  • stolen bank account details, email accounts, and even full identities
  • Where once stolen cards used to be used fairly quickly making it easy to detect and cancel the card overseas fraudsters now bought the card details in bulk and stockpiled them for later use, making it difficult to detect where or when the information was stolen.
  • ...1 more annotation...
  • "It's costing banks tens of millions of dollars in Australia and New Zealand alone."
Ahmed Kiyoshi El Maghraby

Case of stolen online identity - Technology - smh.com.au - 1 views

  • is daughter was among those who received the fake appeal and alerted him. The Balmain resident tried to log in to his Facebook account to see what was happening but couldn't.
  • "It said my email wasn't registered," he says.
  • Identity theft and scams on social networking sites, though, are not uncommon occurrences.
  • ...5 more annotations...
  • "ID theft has existed in both the online and physical world for some time."
  • Some users have their identity compromised via phishing sites that fool them
  • he threats to users on social networking sites
  • Other users click an email or website link that leads them to a web page that installs malicious software
  • criminals become "friends" and check a user's profile in the hope of guessing a password.
1 - 5 of 5
Showing 20 items per page