ITS

Impact of Phishing

Impact of Phishing The impact of falling prey to phishing can be of varying levels. The most common and direct impact is a leakage of confidential or sensitive information. This could be your personal credit card information, or the account credentials for your company. In the latter case, the implications

Trend Micro Apex One

Trend Micro Apex One Trend Micro Apex One is a next-generation endpoint security solution that protects your desktops and notebook computers from security risks. Apex One leverages Trend Micro’s Smart Protection Network™ to provide up-to-the-second global threat intelligence directly to your endpoint. It provides protection against zero-day vulnerabilities, virus, malware,

Invitation to CyberN’US 2020

Invitation to CyberN'US 20202nd October Friday from 9am Sign up now at https://www.accelevents.com/e/cyberNUS.   In this annual forum that unites our community in building cyber resilience, we bring you the best of thought leadership and insightful discussions. Paula Januszkiewicz, renowned hacker and leading cybersecurity expert will deliver an address on

BEC Scam Email with Subject “Quick assistance needed please” or “Request”

We have observed a new wave of scam emails (known as Business Email Compromise or BEC) in NUS, some of which unfortunately involved individuals falling prey and leading to personal financial loss. Unlike phishing emails, these scams do not require you to click on any link or provide any credentials. Instead, they usually start with an innocuous message like “Are you available” and continue as a plea for help should one reply. Eventually, the scammer will attempt to convince and trick the victim into purchasing iTunes gift cards on their behalf. To add credibility, the emails are seemingly sent from someone of authority like the Head of Department using a spoofed email address.