Home > Resources > Tips
  • Email Abuse
    MyCERT considers E-mail Abuse as a serious offence. If you receive any of the following, please e-mail to mycert [at] mycert.org.my. Please attach a copy of the e-mail also...
  • Fraud
    It is strictly where a computer system is instrumental to the crime, for example, it's processing capability is used to divert funds illicitly...
  • Home Users
    Computers used by home users generally are not well protected compared to computers at corporate environment. Connection to the Internet either via modem or high-speed broadband connections will expose them to intruders...
  • Malicious Software
    Malicious software also known as malware is a computer program created with malicious intents. It performs some malicious tasks such as stealing your identity, key logging, disrupt system, damage data or may attack other computers...
  • Network Abuse
    MyCERT considers Network Abuse as a serious offence. If you directly involved, have received or have been attacked by any of the following, please e-mail to mycert [at] mycert.org.my...
  • Operating System
    Operating system is the most integral part of a computer that operates behind the scene to control the overall operation such as input/output, memory, processor and job scheduling...
  • Publication
    Guideline to Safe Web Browsing, Wrap Up of Security Incidents for 2005...
  • Web Security
    One of the most useful features of the Internet is the World Wide Web (WWW) which has contributed to the Internet's growth so much. It is built on open standards where almost all web browsers comply to it...
  • Security Links
    In order to assist the MyCERT constituency, MyCERT provides some links to the related documents below for ease of retrieval to help you reduce your network vulnerability. You are encouraged to be informed and updated on network security information...
 
Contact Us | FAQ | Site Map | Disclaimer | Copyright © - CyberSecurity Malaysia