3 Pemimpin Dr, #06-04 (07), Singapore 576147
+65 8839 6772

Author: Publisher

Safety at Work…From Home – Addressing Online Cyber Security Issues Working From Home

Introduction Due to the Covid-19 situation, more people are working from home & spending more time online which may be a sign that there is more opportunity for hackers to strike.In this case study, we will be looking at some of the methods in which cyber crime happens in a common place which we all…
Read more

When Culture Plays a Part – A Strong Factor in Cyber Security Strategy

Introduction As we leap into a digital age where technology is prevalent in our lives, we tend to be inseparable with our digital devices. The devices we own such as our smart phones, smart watches as well computers and tablet all contain part of our lives in it. Confidential information such as our payment credentials…
Read more

The Unexpected Curriculum – Case study: Information Security in Education

Introduction When we think about hackers, it most likely means any skilled computer expert who uses their technical skills to tackle an issue. While a “hacker” can refer to any skilled computer programmer, the term has been incorporated by popular culture by portraying hackers as someone who, with their technical knowledge, uses bugs or exploits…
Read more

Who is watching you? – Safe Video Conferencing Tips

Background As we see a rise in technological popularity during this period, we are enhancing our skills to harness the need of using digital means to replace the day to day tasks we do. Tasks such as meetings and interactions are rapidly moved to online meeting platforms such as skype, zoom, and google meets where…
Read more

The Emotet Malware – Using Covid-19 as an Opportunity for Cyber Crime

Background In 2019 December, the city of Wuhan experienced a virus with symptoms like pneumonia spreading around china like wildfire. Today, 80000 people are infected with the virus in china and other countries are experiencing the fear of getting infected by the virus. Singapore was not spared either as amidst the fear, there are cyber…
Read more

The TJX Breach – Do Not Cut Corners When It Comes To Security, Be Cyber Vigilant

Background TJX Companies Inc. (TJX) is a leading off-price apparel and home fashions retailer and owner of a number of retail brands, including T.J.Maxx, Marshalls and Bob’s Stores. TJX suffered from a major security breach from 2005 to 2007. Over the span of 18 months starting from July 2005, 45.6 million credit and debit card…
Read more

Case Study: Singhealth Data Breach Cyber Attack with infographics

OVERVIEW Between June 27 and July 4 2017, a foreign, persistent and sophisticated threat group broke into SingHealth’s system and gained access to the Sunrise Clinical Manager (SCM) database holding electronic medical records. It stole the personal data of 1.5 million patients and the outpatient medication records of 160,000 of them — including Prime Minister…
Read more

The Veterans Affair Breach – Anyone Can Be The Weakest Link

Background On May 3, 2006, a data analyst at Veterans Affairs had his computer equipment stolen from his home in Montgomery County, Maryland. The analyst had taken his laptop PC and external hard disk home without permission.The hard disk contained unencrypted insurance claim data for 26.5 million active duty troops and veterans, leaving them open…
Read more

The Stuxnet Worm – Cyber Warfare, The Invisible Weapon

Background Over 15 Iranian nuclear facilities at Natanz were attacked and infiltrated by the Stuxnet worm and an estimated number of 984 uranium enriching centrifuges were destroyed after the virus caused them to burn themselves out. Stuxnet, the first known virus to be capable of crippling hardware, is thought to be created by the United…
Read more

The Sony Breach – Safeguard Information and Avoid Blackmail

Background In November 2014, Sony Pictures suffered from a major cybersecurity breach. Hackers not only erased data from its systems and computer infrastructure, using a variant of the Shamoon wiper malware, but also stole nearly up to 100 terabytes of sensitive data from Sony. This information which was gradually released to the public included pre-release…
Read more