CyberSense

Bulletins presenting insights gleaned from cybersecurity news

Filter By:
The Bluetooth Security Issues
In the past, the only way to connect devices was via cables, which can be cumbersome and messy. With ...
The Bluetooth Security Issues
Wireless Security for Home Network
How many times have you “borrowed” the wireless connectivity from your neighbours when ...
Wireless Security for Home Network
5 Safety Tips when Using a Public Computer
Public computers in libraries, Internet cafes and airports can be safe if you follow a few simple ...
5 Safety Tips when Using a Public Computer
Killnet - From Cybercriminals to Cyber-Partisans
As the Russia-Ukraine conflict progressed, hacktivism slowly took centre-stage, with many hacker groups taking sides and providing support for the cyber-conflict. ...
Killnet - From Cybercriminals to Cyber-Partisans
Data breaches
Since 2005, data breaches have been on the rise, with millions of records exposed in each breach. While data breaches are not new, the proliferation of ...
Data breaches
Computer Security – How you can stay on top of it
There used to be a time when the only computer threat you had to worry about was viruses. Today, the ...
Computer Security – How you can stay on top of it
Overview of Legislations on Cybersecurity, Personal Data Protection & Computer Misuse
The Overview of Legislations on Cybersecurity, Personal Data Protection & Computer Misuse e-handbook explains the differences between the Cybersecurity Act, Computer Misuse Act and Personal Data Protection Act.
Overview of Legislations on Cybersecurity, Personal Data Protection & Computer Misuse
Blockchain Technology and the Metaverse
Web3, blockchain technology and the metaverse - these three buzzwords have recently gained intense popularity in 2021, as interest in cryptocurrencies ...
Blockchain Technology and the Metaverse
Guidelines for CII Owners to Enhance Cyber Security for 5G Use Cases
The Guidelines for CII Owners to Enhance Cyber Security for 5G Use Cases suggests measures to help Critical Information Infrastructure Owners (CIIOs) identify threats that can be introduced into systems connected to 5G services.
Guidelines for CII Owners to Enhance Cyber Security for 5G Use Cases

Report an Incident

CSA’s core mission is to keep Singapore’s cyberspace safe and secure, to underpin out National Security, power a Digital Economy, and protect our Digital Way of Life.
Report Incident