We have observed a new wave of scam emails (known as Business Email Compromise or BEC) in NUS, some of which unfortunately involved individuals falling prey and leading to personal financial loss. Unlike phishing emails, these scams do not require you to click on any link or provide any credentials. Instead, they usually start with an innocuous message like “Are you available” and continue as a plea for help should one reply. Eventually, the scammer will attempt to convince and trick the victim into purchasing iTunes gift cards on their behalf. To add credibility, the emails are seemingly sent from someone of authority like the Head of Department using a spoofed email address.
ITS Sponsorship of NUS CREATION 2022 Event
IT Sponsorship of NUS CREATION 2022 Event NUS IT Security is pleased to be a sponsor of the CREATION 2022 event organised by the NUS Student's Union. IT Security is sponsoring three challenge statements this year for students to design collaterals related to: - Phishing - Ransomware - Business Email
Exercising positive security behaviours: Key takeaways from the OCBC scamming incident
Exercising positive security behaviours: Key takeaways from the OCBC scamming incident In the last two weeks of December 2021, multiple OCBC customers received a series of phishing SMSes (smishing). Unfortunately, 790 of them fell prey to the scams, resulting in a total financial loss of $13.7 million. Image: Samples of
NUS Bug Bounty Challenge 2021 – Hall of Fame
NUS Bug Bounty Challenge 2021 - Hall of Fame The NUS Bug Bounty Challenge 2021 has been concluded, and we would like to thank all the participants who joined this year. We look forward to seeing you again in the next Bug Bounty Challenge. In the meantime, check out those
Tiktok/Instagram Cyber Security Video Challenge
Tiktok Instagram Cyber Security Video Challenge Calling social media users, content creators and influencers, join our Tiktok/Instagram video challenge. Create a video that can help educate our NUS users (students and staff) and promote their safety habits on the following topics of cyber security: Topic Category Description Topic 1: Reviewing key
NUS Bug Bounty Challenge 2021
NUS Bug Bounty Challenge 2021 https://youtube.com/watch?v=H6ltAg_-yvs The NUS Bug Bounty Challenge is back! Similar to last year, we are inviting all NUS staff and students to participate in this event. Stand a chance to win attractive cash prizes, earn extra marks (for eligible modules) and gain a place in our
NUS IT Security Slogan Crowdsourcing
NUS IT Security Slogan Crowdsourcing Join our crowdsourcing campaign to identify a tagline (slogan) that NUS will use permanently on various security awareness campaigns. The slogan (or tagline) should promote: Personal responsibility in protecting the institution and its’ data from cyber-attacks. Foster security collaboration in the NUS community. And instill
Impact of Phishing
Impact of Phishing The impact of falling prey to phishing can be of varying levels. The most common and direct impact is a leakage of confidential or sensitive information. This could be your personal credit card information, or the account credentials for your company. In the latter case, the implications
Trend Micro Apex One
Trend Micro Apex One Trend Micro Apex One is a next-generation endpoint security solution that protects your desktops and notebook computers from security risks. Apex One leverages Trend Micro’s Smart Protection Network™ to provide up-to-the-second global threat intelligence directly to your endpoint. It provides protection against zero-day vulnerabilities, virus, malware,
Invitation to CyberN’US 2020
Invitation to CyberN'US 20202nd October Friday from 9am Sign up now at https://www.accelevents.com/e/cyberNUS. In this annual forum that unites our community in building cyber resilience, we bring you the best of thought leadership and insightful discussions. Paula Januszkiewicz, renowned hacker and leading cybersecurity expert will deliver an address on