Cyber Security Threats
Home > 
Cyber Security Threats
< back
Result: Item(s)
Protecting Children from Online Threats
When children go online, they face new dangers and need more protection. Examples of the risks are: privacy of software and music, disclosure of personal information, spyware, illegal downloads, spam emails and so on.
Guidelines for Using Software
A wide range of software can provide tools for ensuring information security.
Defending against DDoS Attack
DDoS attack attempts to consume both network bandwidth and server resources of the targeted organisation. Large scale DDoS attack is often performed by botnets which can co-opt numerous infected computers, which usually spreading across different points around the world, to unwittingly participate in the attack.
Security Incident Handling for Companies
An Information Security Incident is an adverse event in an information system and/or a network that poses a threat to computer or network security in respect of availability, integrity and confidentiality.
Handling Malware Outbreak
Given that attackers are now moving away from attacks that are merely a nuisance or destructive towards activity that is motivated by financial gain, malicious code attacks have become more sophisticated and a significant concern to organisations.
Avoiding Phishing Websites
Try to avoid visiting phishing websites that imitate sites of well-known organisations. These are purposely setup to collect sensitive information from visitors, such personal information, usernames and passwords, in a fraudulent manner. This type of activity is notorious, and is known as phishing.
Tips for Preventing Web Attacks
To avoid your PC being compromised and becoming a weapon to attack other machines, some tips are advised to web application and Internet users.
Playing Online Games Safely
Many computer and console video games can be played online against other players over the Internet. Players are allowed to communicate sometimes using text messages typed into the computer and sometimes using a microphone.
Avoiding Phone Fraud
Criminals also use the phone, and especially Internet phone systems, to trick people.
Securing Your New PC
Don't forget to implement necessary security measures when you set up your new PC at home. Just taking a new computer out of the box and connecting it to the Internet is not safe. You are exposing your PC to a number of security risks, such as virus and malicious codes infection, spam emails, denial of service attacks, disclosure of personal or sensitive information and so on.
Protecting against Malware
The best practices can protect your computer(s) more effectively against malware attacks
Security Incident Handling for Individuals
To give home computer users a guide to basic measures to take if they encounter a Security Incident.
Botnet
Botnets are serious security threats to the Internet and they account for a majority of email spam, identity theft, phishing and distributed denial-of-service (DDoS) attacks.
Brute Force Attack
Brute force attack is the crack of credentials using all possible combinations by trial-and-error method until the password is guessed correctly.
Cyber Threats on Blockchain
While blockchain technology produces a tamper-proof transaction ledger, it should be noted that blockchain is not immune to all cyber attacks.
Cyber Threats on DNS Servers
DNS-based attacks are becoming highly sophisticated and volumetric. Attackers are increasingly adopting multifaceted techniques to exploit different DNS components.
Data Breach
Data breach is a security incident in which data are accessed, altered, erased, stolen or leaked from a system without the consent of the system’s owner.
Deepfake
In recent years, deepfakes have attracted public attention for their malicious uses in the creation of fake videos, forged images and financial fraud, resulting in the spread of misinformation or disinformation which can potentially erode the reputation of businesses and trust among people. Nowadays, tools that create deepfakes are becoming more readily available. Plausible deepfakes have elicited public responses to detect and limit their use.
DoS / DDoS Attacks
Denial of service (DoS) and distributed denial of service (DDoS) attacks are among the most common cyber threats on the Internet.
Identity Theft
Identity theft is a criminal act of getting hold of personal data of others without their knowledge or permission with an intent to defraud. The personal data is used by identity thieves to impersonate the data subjects for fraudulent purposes.
Insider Threat
An insider threat is a security risk that originates from within an organisation. It typically involves current or former employees, and outsourced business associates who have access to sensitive information or privileged accounts.
Malware
Malicious code refers to computer viruses, worms, spyware, Trojan Horses and other undesirable software. Attack made by using such software is to cause disruption either by deleting files, sending emails, or rendering the host system inoperable.
Phishing
Phishing emails often look 'official', some recipients may respond to them and click into malicious websites resulting in financial losses, identity theft, and other fraudulent activity.
Ransomware
Ransomware is a malicious software that cyber criminals used to lock the files stored on the infected computer devices. These locked files are like hostage and the victims are required to follow the instructions of this malicious software and pay a ransom to unlock them.
Supply Chain Attack
Supply chain attacks are becoming increasingly popular since attackers can access systems of multiple organisations through trusted third-party vendors.