Top 5 Cyber Security Threats in 2021: Essential Cyber Intelligence for Singapore Cybersecurity threats come in various forms of malicious acts such as computer viruses, data breaches and distributed denial-of-service (DDoS) attacks. Such attacks or viruses can disrupt the services of a service provider and while steal raw data from organizations or businesses, resulting potential damage in business revenues. |
Top 5 Cyber Security Threats in 2021: Essential Cyber Intelligence for Singapore A secure cyberspace underpins our national security, powers a digital economy, and protects our digital way of life. |
How to guard against common types of data breaches Based on past data breach cases handled by the Personal Data Protection Commission (PDPC), this handbook identifies the five most common gaps in ICT system management and processes. |
Tools used by fraudsters in phishing scams easily found online The tactics used by fraudsters in the recent spate of SMS phishing scams have been called sophisticated, but many of the tools used are easily available. |
Spot Signs of Phishing - Marketing Video 1 (English) by Cyber Security Agency of Singapore
You wouldn't share your personal information with strangers. Be vigilant and learn to spot signs of phishing. Get more cyber tips at go.gov.sg/bettercybersafe
How to avoid falling for phishing scams by Channel News Asia
In light of the spate of bank-related scams in Singapore, do you know how to protect yourself from getting conned?
Are You Being Hacked? Meet The Cybersecurity Heroes Fighting The Deep, Dark Web | On The Red Dot by CNA Insider
Cybercrime is now one of the most pressing threats our world has ever faced. In hyperconnected Singapore, online crimes like e-commerce scams, phishing attacks and malware infections accounted for more than a quarter of all criminal cases in 2019. And what’s perhaps surprising is that millennials and teenagers are becoming the ones most at risk.
Actress and host Ching Shu Yi ventures into the cyber underground and discovers how the very technology cyber criminals use to attack their victims is now being used to beat them at their own game. With a group of white hats and cyber sleuths as her guide, Shu Yi visits a dark web marketplace where stolen data is traded, and soon finds herself hacked, stalked and spied on by the electronic devices around her, from hidden drones to her own mobile phone.
DeVry University (2021, Aug 31). A Constant Threat: The Impact of Cyber Hacks [Infographic].