ALERT: Stay vigilant and exercise caution against online scams. Never share confidential information, passwords, OTPs and bank details over calls, emails or SMSes.
SG

Month: September 2024

AI and Cybersecurity

AI and Cybersecurity: What You Need To Know From Singapore’s AI Security Summit

Artificial Intelligence (AI) has become increasingly integrated with cybersecurity, both as a threat vector and a means for defence. This was the core message shared at the inaugural Singapore AI Security Summit held by the Association of Information Security Professionals (AiSP) on 3rd July 2024. Attended by stakeholders of the cybersecurity industry, the AI Security Summit served as a gathering of minds for members to discuss the future and outlook of Singapore’s cybersecurity environment in relation to AI.

Malvertising

Malvertising: How Cybercriminals Are Exploiting Digital Ads

Within these ads, however, lie wolves in sheeps’ clothing. Armed with nefarious intent, a rising trend of malvertising has emerged where cyber criminals spread malware through digital ads on reputable websites. These ads, which exploit the user’s trust in familiar brands, steal sensitive information by luring victims to deceitful websites and directing them to download malware disguised as harmless content.

Virtual Private Networks

Understanding Layer 2 Virtual Private Networks (L2VPN) And Their Benefits

In the early 1980s, the Open System Interconnection (OSI) model was devised to outline the seven layers of network communication. It served as the early model for network communications and paved the way for modern Transmission Control Protocol/Internet Protocol (TCP/IP) systems, which were developed in the 1970s and upon which the 21st-century Internet is founded. Within the OSI model, Layer 2 specifically refers to how data links are set up and defines the data format on each network.

3 Types of Cloud Computing Services

The advent of cloud computing has changed how we approach technology, offering unprecedented scalability, flexibility, and cost-efficiency. By providing on-demand access to computing resources via the internet, cloud services eliminate the need for businesses to handle physical resources themselves, reshaping the management of IT resources for businesses. In this article, we discover the three key types of cloud computing services that are transforming IT infrastructure management.