We have observed a new wave of scam emails (known as Business Email Compromise or BEC) in NUS, some of which unfortunately involved individuals falling prey and leading to personal financial loss. Unlike phishing emails, these scams do not require you to click on any link or provide any credentials. Instead, they usually start with an innocuous message like “Are you available” and continue as a plea for help should one reply. Eventually, the scammer will attempt to convince and trick the victim into purchasing iTunes gift cards on their behalf. To add credibility, the emails are seemingly sent from someone of authority like the Head of Department using a spoofed email address.
Trend Micro Apex One
Trend Micro Apex One Trend Micro Apex One is a next-generation endpoint security solution that protects your desktops and notebook computers from security risks. Apex One leverages Trend Micro’s Smart Protection Network™ to provide up-to-the-second global threat intelligence directly to your endpoint. It provides protection against zero-day vulnerabilities, virus, malware,
Encrypt File (WinZip for Mac)
Encrypt File (WinZip for Windows)
In late 2016, we have observed many hacking activities with the intent to exploit vulnerabilities of outdated Content Management System (CMS) and the plugins. CMS is a software used to manage the content of a website. Commonly used CMS includes WordPress, Joomla,…
Protect Your Data Secure Hard Disk Disposal
To view the contents of this post, you must be authenticated and have the required access level.
Protect Your Data Secure File Removal
To view the contents of this post, you must be authenticated and have the required access level.
Protect Your Data Mac Folder Encryption
To view the contents of this post, you must be authenticated and have the required access level.
Encrypting Flash Drive
To view the contents of this post, you must be authenticated and have the required access level.
Protect Your Data File Encryption using WinZip
To view the contents of this post, you must be authenticated and have the required access level.