| | | | | | | | | |

Extortion Emails: How to spot & What to do

[4 mins read] What are Extortion Emails?  Imagine this: You wake up one morning, tired and half-asleep, and you open your inbox to see a message that makes your blood run cold. The email claims that your private data has been stolen. Not just any data, but your most intimate secrets, the kind that could…

| | | | | | |

Beware the Click: Social Media’s Hidden Shopping Scams

[2 mins read] Online shopping has become an essential part of our lives, offering convenience and accessibility like never before. However, with the rise of e-commerce, a darker side has emerged – scams. Scammers are increasingly exploiting the vast user base of platforms like Facebook, Instagram, and TikTok to carry out fraudulent activities, leaving unsuspecting…

| | | | | | | | | | |

Key Lessons from 5 Cyber Attacks Every Business Should Know

[2 mins read]With today’s digital advancements, businesses face competition not only in the market but also in the challenging world of cybersecurity. Singapore, a global hub for finance and technology, has organisations among the most targeted in the world by ransomware attacks. To help businesses strengthen their defense in this evolving landscape, the Cyber Security…

| | | | |

Securing The Workforce: Fostering Scam Awareness Among Workers

[3 mins read] As scam levels continue to rise, affecting not only businesses but vulnerable individuals such as migrant workers, it becomes critical for businesses to step up their efforts in scam prevention. As shared in a recent report, about 3,500 migrant workers lost more than S$25 million to scams in the year 2022. In…

| | | | |

New Scam Alert: The Fake Friend Trap

In the digital age, where communications become a simple task with a few clicks, scammers find innovative ways to exploit unsuspecting victims. A new technique that has recently surfaced is the “Fake Friend” call scam. It is reported earlier this year, that more than 945 victims have fallen prey, losing more than S$3.2 million in…

| | | |

The Dark Side of Digital Trickery: Danger of Deepfake

Deepfake refers to the use of Artificial Intelligence (AI) and machine learning techniques to create or manipulate videos, images, or audio recordings that seemed to be authentic. In fact, these synthetic or altered contents are often very well created, most individuals would not know that it’s actually fake. Deepfake technology emerged as a powerful AI…

| | | | | | |

New Phishing Scams: Don’t Fall Victim to ScamShield App Scam

Earlier this month, the Singapore Police Force (SPF) released an advisory on phishing scams involving fake ScamShield mobile application. Scamshield is an anti-scam mobile application developed by the National Crime Prevention Council and Open Government Products, and was launched in 2020. It detects scam messages, blocks out scam calls automatically, and allows users to report…

| | | | | | |

Cybersecurity Tips at Home- Protecting You & Your Loved Ones

The internet has become a part of our everyday lives. It has brought about many benefits and opportunities, but it also poses a significant threat to our safety and security. As technology evolves, so do cyber threats. The more we rely on the internet, the more we need to be aware of the dangers and…

| | | | | |

Phishing vs Spear Phishing: What’s the Difference and How to Stay Safe?

[2 mins read] In today’s technology-driven world, we rely heavily on electronic communication. However, technology is a double-edged sword. Technology has revolutionized the way we live and work. Some benefits include increased efficiency, convenient communication, easy access to information, medical advancements, and environmental benefits. It is important to note that the progress of technology is…

| | | | | |

Cyber Security: Protect Your Personal Information

[2 mins read] Sensitive information is the key to the gold mine for cybercriminals. With stolen sensitive information, cybercriminals may use it as fuel for other cyber crimes such as identity theft, phishing, blackmailing, extortion, impersonation, ruining your reputation, or simply just selling the information on the black market for a profit. Personal data Your…