Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Recent breach exposes supply chain risks via OAuth and secrets misclas...
DESILO Launches World’s First Fully Homomorphic Encryption Libra...
North Korean hackers steal more than US$12m from Web3 developers using...
Tencent Cloud Cube Sandbox Goes Fully Open-Source, with Five Major Bre...
We buckle seatbelts instinctively: why not authentication standards?
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      How AI is supercharging insider threats

      How AI is supercharging insider threats

      Wednesday, April 15, 2026, 12:29 PM Asia/Singapore | Features
    • Featured

      Q-Day is coming. Are you ready?

      Q-Day is coming. Are you ready?

      Tuesday, April 14, 2026, 12:40 PM Asia/Singapore | Features
    • Featured

      How lean defence teams turn endpoint insights into measurable risk reduction

      How lean defence teams turn endpoint insights into measurable risk reduction

      Monday, April 13, 2026, 3:15 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2026
  • Directory
  • E-Learning

Select Page

Features

Are Singaporeans ready to handle deepfakes and disinformation in the 2025 general elections?

By Victor Ng | Wednesday, April 9, 2025, 5:03 PM Asia/Singapore

Are Singaporeans ready to handle deepfakes and disinformation in the 2025 general elections?

Can the island-state serve as a global benchmark for election security as it gears up for national elections in May 2025?

AI has supercharged the internet and social media. As much as new information becomes available, so do disinformation and deepfakes. This is grim for governments and citizens, especially in an election year. 

For instance, India’s general elections in 2024 offered a glimpse of how politicians could innovate with AI-generated videos to enhance their reach, while opening up the question of manipulative disinformation via deepfakes.

In a fraud exposure survey in 2024, 85% of APAC respondents were concerned about deepfakes, expressing fear about their future impact on elections. Nations like South Korea (1625%), Indonesia (1550%), and India (280%) have seen increases in deepfake incidents that far surpass the global average, revealing a concerning trend that threatens to distort political discourse and voter perceptions.

In Singapore, while some progress has been made with a law passed in October 2024 banning deepfakes of candidates during the election period, is this enough to address the challenge of disinformation, especially during such a critical period for Singaporeans?

We find out more from a quick Q&A with Chester Wisniewski, Director, Field CTO, Sophos.

With the rise of genAI in the Asia Pacific region, are social media platforms doing enough to detect and combat deepfakes? How can we enforce deeper accountability from these platforms?

Chester Wisniewski (CW): No, social media platforms are not doing enough, and there isn’t anything we can likely do about this problem. 

Ideally, we want the large commercial AI providers to curb abuse, but with models being made freely available it is impossible to prevent abuse as people wishing to bypass the limitations will simply run the models themselves, without the guardrails. The “cat is out of the bag” as they say, and there is no going back now. 

How serious is the threat of voice/audio cloning? Is this the next disinformation tool we should be wary of? Are there other tools or techniques we should be mindful of?

CW: Voice cloning technology is now widely available, with a passable rate of authenticity. We need to be very wary and bolster our authentication processes to take this into account. It is no longer costly nor time-intensive to create a voice clone making it widely available with a low barrier to entry. This is not yet true of video clones, which are much more expensive and complex to create, but we should be prepared for the time when it is as simple to do as audio has already become. 

We have not quite reached the ability to voice clone in real-time, but I expect we will have this ability before too long. The current abuses have all been financially motivated, so the best approach is to always verify the identity of someone asking for a wire transfer, crypto investment, or other money transmission using a different method of communication using contact methods you have previously established. 

Can deepfakes really affect the outcomes of polls in general, and for Singaporeans in particular as they head to a general election this year?

CW: People should only rely on information from verified sources rather than social media. It is tempting to trust content shared by your friends and loved ones on social platforms, but these tools are being weaponized at scale and can fool even those you trust. 

If you see a video or audio clip that makes you angry or confused about the message you should search news outlets for coverage. Most media organizations will point out fakes that have achieved popularity and if something is truly controversial would confirm the authenticity with experts or eyewitness accounts.

How can the law and regulations keep up with disinformation, especially during election periods?

CW: I cannot comment on legal strategies, but the law needs to be crafted with the understanding that this technology exists, is accessible, and it unlikely to be eliminated.

Share:

PreviousWhen do rival ransomware-as-a-service groups co-operate in competition?
NextSurvey indicates levels of banking security and customer trust in Indonesia

Related Posts

As GenAI turbocharges cyber scams, society needs to protect young digital natives

As GenAI turbocharges cyber scams, society needs to protect young digital natives

Thursday, February 13, 2025

More to serverless computing security than meets the budget

More to serverless computing security than meets the budget

Thursday, October 14, 2021

Defense industrial bases face evolving cyber threats in 2026: analysis

Defense industrial bases face evolving cyber threats in 2026: analysis

Monday, February 16, 2026

When unsolicited developer job offers are too good to be true, suspect Lazarus

When unsolicited developer job offers are too good to be true, suspect Lazarus

Friday, September 20, 2024

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Cyber protection for medical clinics in Singapore

    Cyber protection for medical clinics in Singapore

    As Singapore’s healthcare sector becomes increasingly digital and interconnected, clinics are facing heightened cyber risks, …Read more
  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more

Bottom sidebar

Other News

  • DESILO Launches World’s First Fully Homomorphic Encryption Library Integrating 5th-Generation FHE Scheme ‘GL’, Accelerating the Era of Private AI

    Tuesday, April 28, 2026
    SEOUL, South Korea, April 28, …Read More »
  • Tencent Cloud Cube Sandbox Goes Fully Open-Source, with Five Major Breakthroughs Enabling Large-Scale Agent Deployment

    Thursday, April 23, 2026
    Tencent Cloud’s Cube Sandbox goes …Read More »
  • Sparrow to Demonstrate AI-Driven Security and SBOM Management at Black Hat Asia 2026

    Wednesday, April 22, 2026
    SINGAPORE, April 21, 2026 /PRNewswire/ …Read More »
  • Relativity to Establish Singapore Entity, Expanding APAC Footprint

    Wednesday, April 22, 2026
    News Summary:  Relativity plans to …Read More »
  • Cohesity Appoints Nigel Lee as Technical Sales Leader, Asia Pacific and Japan (APJ)

    Wednesday, April 22, 2026
    SINGAPORE, April 21, 2026 /PRNewswire/ …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.