This article discusses two recent reported incidents of human trafficking in Malaysia and the indications of the 2023 Human Trafficking In Person Report on Malaysia.
read moreWhatsapp Zero Day
This article explored the pervasive threat of zero-day exploits on the widely used messaging platform, WhatsApp. Dwelling into the specific targets of these exploits and the vulnerabilities that make these groups susceptible to cyberattacks.
read moreThe Peking Duck Scam
This article discusses a malware scam based on an incident in Singapore in which a man was scammed of a substantial sum on monies when he downloaded a third-party app to purchase a Peking Duck dish.
read moreIs it the AI Quagmire? A tale from South Korea
This article is inspired by a recent event in South Korea that was sentenced to jail for generating exploitative images of children using generative AI. This article discusses the deeper layers of a person's cognitive processes in terms of mental proliferation, clinging and sensual desires.
read moreTrust in AI Use
This blog post is based on a recent academic study that investigates the formation of trust in AI, shedding light on the complexities faced by travelers and stakeholders. The research, conducted through a comprehensive empirical investigation involving 209 users, explores both individual and institutional viewpoints in the formation of trust in AI.
read moreMetaverse in Hospitality and Tourism
This article is based on a paper published in the International Journal of Contemporary Hospitality Management that delves into the dynamic space of metaverse, discussing the current context, scope, and potential impacts of the metaverse on the hospitality and tourism industry. It discusses the integration of immersive technologies, virtual experiences, and real-time interactions, emphasizing the need for meaningful customer engagement. Additionally, the paper highlights the importance of privacy, security, and sustainability in metaverse applications.
read moreThe Yin and Yang of the Hacking Psyche
This article explores the psychological toll experienced by hackers and its relationship with anonymity. It considers the dualistic nature of hacker psychology, highlighting the interplay between negative emotional consequences (Yin aspects) and coping mechanisms (Yang aspects). The study discusses how anonymity intensifies emotional conflicts and examines the strategies hackers employ to mitigate the psychological toll.
read moreThe Wei Liaozi (尉繚子) and Modern Cyber Adversarial Tactics
The Wei Liaozi (尉繚子) is an ancient Chinese text that provides valuable insights into the aspects of espionage, covert operations, and intelligence gathering for understanding adversarial tactics. In this article, we explore the relevance of "The Wei Liaozi" in the context of cybersecurity, focusing on how this text offers guidance on covert operations, provides insights into the covert nature of hacking activities, and emphasizes the importance of gathering intelligence to defend against cyber threats.
read moreAI Malevolence: Lessons from Almendralejo
Inspired by a recent event in Spain where AI-generated naked images of girls were circulated widely, this article explores the dual nature of AI's impact on society, focusing its potential for misuse. It discusses briefly a range of malevolent possibilities, including deepfake manipulation, chatbot phishing, algorithmic bias, and privacy invasions. The article underscores the importance of recognizing and addressing these challenges in the ongoing integration of technology into our lives, emphasizing the need for ethical consideration and responsible technology use.
read moreGraph101: Circular Layout
This article discusses an example of circular layout visualisation
read more