ITS

Install Bitlocker (Windows 8)

In late 2016, we have observed many hacking activities with the intent to exploit vulnerabilities of outdated Content Management System (CMS) and the plugins. CMS is a software used to manage the content of a website. Commonly used CMS includes WordPress, Joomla,…

FAQ: Encrypting Flash Drive

FAQ: Encrypting Flash Drive 1. Why is it necessary to perform the initial setup? Can I just store files on the thumbdrive without doing so?The initial setup creates an encrypted storage area on the thumbdrive – whether you are using BitLocker, FileVault or Trek. Files stored in this encrypted area

NUS Bug Bounty Challenge Scope and Rules

NUS IT is excited to announce the NUS Bug Bounty Program, an initiative to improve our cybersecurity awareness and posture through community effort. Partnering with HackerOne and SOC, we aim to expose ALL NUS students to ethical hacking through online games, sharing by hackers and discovering bugs on NUS production systems. Sign up now!