fbpx
3 Pemimpin Dr, #06-04 (07), Singapore 576147
+65 8839 6772
customerservice@cyberforsec.com

Author: CFS

Join the “on-demand, gig economy” with CyberForSec®, the platform for Services Enabled Collaborators

Case Study: Singhealth Data Breach Cyber Attack with infographics

OVERVIEW Between June 27 and July 4 2017, a foreign, persistent and sophisticated threat group broke into SingHealth’s system and gained access to the Sunrise Clinical Manager (SCM) database holding electronic medical records. It stole the personal data of 1.5 million patients and the outpatient medication records of 160,000 of them — including Prime Minister…
Read more

The Veterans Affair Breach – Anyone Can Be The Weakest Link

Background On May 3, 2006, a data analyst at Veterans Affairs had his computer equipment stolen from his home in Montgomery County, Maryland. The analyst had taken his laptop PC and external hard disk home without permission. The hard disk contained unencrypted insurance claim data for 26.5 million active duty troops and veterans, leaving them…
Read more

The Stuxnet Worm – Cyber Warfare, The Invisible Weapon

Background Over 15 Iranian nuclear facilities at Natanz were attacked and infiltrated by the Stuxnet worm and an estimated number of 984 uranium enriching centrifuges were destroyed after the virus caused them to burn themselves out. Stuxnet, the first known virus to be capable of crippling hardware, is thought to be created by the United…
Read more

The Sony Breach – Safeguard Information and Avoid Blackmail

Background In November 2014, Sony Pictures suffered from a major cybersecurity breach. Hackers not only erased data from its systems and computer infrastructure, using a variant of the Shamoon wiper malware, but also stole nearly up to 100 terabytes of sensitive data from Sony. This information which was gradually released to the public included pre-release…
Read more

The Maersk Breach – Cyber Resilience and Human Resilience

Background On 27 June 2017, shipping and logistics giant Maersk was hit by NotPetya ransomware. NotPetya is a malware originally developed as a disk-wiping cyber weapon by Russian military. The malware’s target was businesses in Ukraine – but it quickly got out of hand and was spreading throughout networks around the world, with almost 50,000…
Read more

The Target Breach – You Are Only as Secure as Your Partners Are

Background In late-November 2013, Target Corporation’s (Target), one of the largest retail companies in the United States, security and payment system was breached. Attackers gained access to Target’s computer network, stole the financial and personal information of as many as 110 million Target customers, and then removed this sensitive information from Target’s network to a…
Read more

The Equifax Breach – Constant Surveillance is Key

Background Equifax, a major United States credit reporting agency, was breached in March 2017, with attackers accessing personal information of at least 145.5 million individuals. Equifax specifically traffics in personal data and with this breach, more than 40 percent of the population of the United States — names, addresses, dates of birth, Social Security numbers,…
Read more

New Growth Area Number 1: Cyber Security

“With rapid technology advancement, the corporate field is now very dependent on technology, and they are using it increasingly to store confidential data and information. This global situation is also attracting cyber criminals who are interested to get access to these important information. Therefore, with the increase in the theft of data and information such…
Read more

New Growth Area Number 2: Immersive Media

“There are numerous advancements in the field of immersive media. For instance, the Google Cardboard VR goggle can enable its user to explore 360-degree interactive environments on a smartphone. As technology progress, immersive media aims at creating 100 percent interactive environments similar to the real world. This needs numerous sensors to ensure more objects in…
Read more

New Growth Area Number 3: IoT

“Internet of Things has grown out from the use of wireless technologies, through micro-electro–mechanical systems, and is providing micro-services to the internet today. Such development has reduced the space and time between operational technology and information technology and has made it possible to analyze unstructured machine-generated data for insights to drive developments. In recent years,…
Read more