Emerging Threats
Home > 
Emerging Threats
< back
Result: Item(s)
Protection against Phishing Attacks for SME
SME protect against Phishing attacks, preventive , detective and responsive measures.
Avoiding Phishing Websites
Try to avoid visiting phishing websites that imitate sites of well-known organisations. These are purposely setup to collect sensitive information from visitors, such personal information, usernames and passwords, in a fraudulent manner. This type of activity is notorious, and is known as phishing.
Protecting against Phishing Attacks
Do not follow URL links from un-trusted sources or emails such as spam emails to avoid being re-directed to malicious websites by malicious links looking seemingly legitimate.
Using QR Code Carefully
QR code is a machine-readable two-dimensional barcode which contains information. Scanning a QR code will redirect you to a website or an application. Due to the prevalence of mobile devices, QR codes have become popular and widely used in advertising, promotion events and even mobile payment. Using QR codes wisely can bring us convenience, but you may easily fall into traps if you underestimate the risks.
Phishing
Phishing emails often look 'official', some recipients may respond to them and click into malicious websites resulting in financial losses, identity theft, and other fraudulent activity.
Ransomware
Ransomware is a malicious software that cyber criminals used to lock the files stored on the infected computer devices. These locked files are like hostage and the victims are required to follow the instructions of this malicious software and pay a ransom to unlock them.
Cyber Threats on DNS Servers
DNS-based attacks are becoming highly sophisticated and volumetric. Attackers are increasingly adopting multifaceted techniques to exploit different DNS components.
Cyber Threats on Botnet
Botnets are serious security threats to the Internet and they account for a majority of email spam, identity theft, phishing and distributed denial-of-service (DDoS) attacks.
Cyber Threats on Supply Chain Attack
Supply chain attacks are becoming increasingly popular since attackers can access systems of multiple organisations through trusted third-party vendors.
Cyber Threats on Blockchain
While blockchain technology produces a tamper-proof transaction ledger, it should be noted that blockchain is not immune to all cyber attacks.