3 Pemimpin Dr, #06-04 (07), Singapore 576147
+65 8839 6772


Building Digital Partnerships with CyberForSec® Partner Programme

Safety at Work…From Home – Addressing Online Cybersecurity Issues Working From Home

Introduction Due to the Covid-19 situation, more people are working from home & spending more time online which may be a sign that there is more opportunity for hackers to strike. Methods used by hackers may be like prompting you to click a link within an email, or some websites links like the ones you…
Read more

The Unexpected Curriculum – Case study: Information Security in Education.

What happens when hacking is becoming a trend that even our schools and students are not excluded?
Find out more in this article as we explore cyber security breaches in schools.

Who is watching you? – Safe video conferencing tips

As we see a rise in technological popularity during this period, we are enhancing our skills to harness the need of using digital means to replace the day to day tasks we do.

The Emotet Malware – Using Covid-19 as an Opportunity for Cyber Crime

What happens when Covid-19 meets cyber crime? Read to find out how cyber attacks are happening amidst this virus period

The TJX Breach – Do Not Cut Corners When It Comes To Security. Be Cyber Vigilant.

Background   TJX Companies Inc. (TJX) is a leading off-price apparel and home fashions retailer and owner of a number of retail brands, including T.J.Maxx, Marshalls and Bob’s Stores. TJX suffered from a major security breach from 2005 to 2007. Over the span of 18 months starting from July 2005, 45.6 million credit and debit…
Read more

Case Study: Singhealth Data Breach Cyber Attack with infographics

OVERVIEW Between June 27 and July 4 2017, a foreign, persistent and sophisticated threat group broke into SingHealth’s system and gained access to the Sunrise Clinical Manager (SCM) database holding electronic medical records. It stole the personal data of 1.5 million patients and the outpatient medication records of 160,000 of them — including Prime Minister…
Read more

The Veterans Affair Breach – Anyone Can Be The Weakest Link

Background On May 3, 2006, a data analyst at Veterans Affairs had his computer equipment stolen from his home in Montgomery County, Maryland. The analyst had taken his laptop PC and external hard disk home without permission. The hard disk contained unencrypted insurance claim data for 26.5 million active duty troops and veterans, leaving them…
Read more

The Stuxnet Worm – Cyber Warfare, The Invisible Weapon

Background Over 15 Iranian nuclear facilities at Natanz were attacked and infiltrated by the Stuxnet worm and an estimated number of 984 uranium enriching centrifuges were destroyed after the virus caused them to burn themselves out. Stuxnet, the first known virus to be capable of crippling hardware, is thought to be created by the United…
Read more

The Sony Breach – Safeguard Information and Avoid Blackmail

Background In November 2014, Sony Pictures suffered from a major cybersecurity breach. Hackers not only erased data from its systems and computer infrastructure, using a variant of the Shamoon wiper malware, but also stole nearly up to 100 terabytes of sensitive data from Sony. This information which was gradually released to the public included pre-release…
Read more

The Maersk Breach – Cyber Resilience and Human Resilience

Background On 27 June 2017, shipping and logistics giant Maersk was hit by NotPetya ransomware. NotPetya is a malware originally developed as a disk-wiping cyber weapon by Russian military. The malware’s target was businesses in Ukraine – but it quickly got out of hand and was spreading throughout networks around the world, with almost 50,000…
Read more