Emerging Threats
Home > 
Emerging Threats
< back
Result: Item(s)
Protection against Phishing Attacks for SME
SME protect against Phishing attacks, preventive , detective and responsive measures.
Avoiding Phishing Websites
Try to avoid visiting phishing websites that imitate sites of well-known organisations. These are purposely setup to collect sensitive information from visitors, such personal information, usernames and passwords, in a fraudulent manner. This type of activity is notorious, and is known as phishing.
Protecting against Phishing Attacks
Do not follow URL links from un-trusted sources or emails such as spam emails to avoid being re-directed to malicious websites by malicious links looking seemingly legitimate.
Using QR Code Carefully
QR code is a machine-readable two-dimensional barcode which contains information. Scanning a QR code will redirect you to a website or an application. Due to the prevalence of mobile devices, QR codes have become popular and widely used in advertising, promotion events and even mobile payment. Using QR codes wisely can bring us convenience, but you may easily fall into traps if you underestimate the risks.
Botnet
Botnets are serious security threats to the Internet and they account for a majority of email spam, identity theft, phishing and distributed denial-of-service (DDoS) attacks.
Brute Force Attack
Brute force attack is the crack of credentials using all possible combinations by trial-and-error method until the password is guessed correctly.
Cyber Threats on Blockchain
While blockchain technology produces a tamper-proof transaction ledger, it should be noted that blockchain is not immune to all cyber attacks.
Cyber Threats on DNS Servers
DNS-based attacks are becoming highly sophisticated and volumetric. Attackers are increasingly adopting multifaceted techniques to exploit different DNS components.
Deepfake
In recent years, deepfakes have attracted public attention for their malicious uses in the creation of fake videos, forged images and financial fraud, resulting in the spread of misinformation or disinformation which can potentially erode the reputation of businesses and trust among people. Nowadays, tools that create deepfakes are becoming more readily available. Plausible deepfakes have elicited public responses to detect and limit their use.
DoS / DDoS Attacks
Denial of service (DoS) and distributed denial of service (DDoS) attacks are among the most common cyber threats on the Internet.
Insider Threat
An insider threat is a security risk that originates from within an organisation. It typically involves current or former employees, and outsourced business associates who have access to sensitive information or privileged accounts.
Phishing
Phishing emails often look 'official', some recipients may respond to them and click into malicious websites resulting in financial losses, identity theft, and other fraudulent activity.
Ransomware
Ransomware is a malicious software that cyber criminals used to lock the files stored on the infected computer devices. These locked files are like hostage and the victims are required to follow the instructions of this malicious software and pay a ransom to unlock them.
Supply Chain Attack
Supply chain attacks are becoming increasingly popular since attackers can access systems of multiple organisations through trusted third-party vendors.