Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Toshiba Showcases Quantum-Safe Networks with SpeQtral and Ciena to Pre...
When ransomware attack rates drop, do not let down your guard
Know the four most common password mistakes
How to outsmart filename masquerading: A practical guide to safer file...
Sophisticated crypto theft operation exploits phishing, smart contract...
LOGIN REGISTER
CybersecAsia
  • Conference 2025
  • Features
    • Featured

      How the UAE proactively protects its digital economy

      How the UAE proactively protects its digital economy

      Monday, May 19, 2025, 2:16 PM Asia/Singapore | Features
    • Featured

      Navigating blockchain adoption amid rising security challenges

      Navigating blockchain adoption amid rising security challenges

      Wednesday, May 14, 2025, 12:32 PM Asia/Singapore | Features
    • Featured

      Backups are not enough for cyber resilience

      Backups are not enough for cyber resilience

      Monday, May 5, 2025, 4:49 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2024
  • Directory
  • E-Learning

Select Page

LOGIN REGISTER
  • Conference 2025
  • Features
    • Featured

      How the UAE proactively protects its digital economy

      How the UAE proactively protects its digital economy

      Monday, May 19, 2025, 2:16 PM Asia/Singapore | Features
    • Featured

      Navigating blockchain adoption amid rising security challenges

      Navigating blockchain adoption amid rising security challenges

      Wednesday, May 14, 2025, 12:32 PM Asia/Singapore | Features
    • Featured

      Backups are not enough for cyber resilience

      Backups are not enough for cyber resilience

      Monday, May 5, 2025, 4:49 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2024
  • Directory
  • E-Learning
Features

Are Singaporeans ready to handle deepfakes and disinformation in the 2025 general elections?

By Victor Ng | Wednesday, April 9, 2025, 5:03 PM Asia/Singapore

Are Singaporeans ready to handle deepfakes and disinformation in the 2025 general elections?

Can the island-state serve as a global benchmark for election security as it gears up for national elections in May 2025?

AI has supercharged the internet and social media. As much as new information becomes available, so do disinformation and deepfakes. This is grim for governments and citizens, especially in an election year. 

For instance, India’s general elections in 2024 offered a glimpse of how politicians could innovate with AI-generated videos to enhance their reach, while opening up the question of manipulative disinformation via deepfakes.

In a fraud exposure survey in 2024, 85% of APAC respondents were concerned about deepfakes, expressing fear about their future impact on elections. Nations like South Korea (1625%), Indonesia (1550%), and India (280%) have seen increases in deepfake incidents that far surpass the global average, revealing a concerning trend that threatens to distort political discourse and voter perceptions.

In Singapore, while some progress has been made with a law passed in October 2024 banning deepfakes of candidates during the election period, is this enough to address the challenge of disinformation, especially during such a critical period for Singaporeans?

We find out more from a quick Q&A with Chester Wisniewski, Director, Field CTO, Sophos.

With the rise of genAI in the Asia Pacific region, are social media platforms doing enough to detect and combat deepfakes? How can we enforce deeper accountability from these platforms?

Chester Wisniewski (CW): No, social media platforms are not doing enough, and there isn’t anything we can likely do about this problem. 

Ideally, we want the large commercial AI providers to curb abuse, but with models being made freely available it is impossible to prevent abuse as people wishing to bypass the limitations will simply run the models themselves, without the guardrails. The “cat is out of the bag” as they say, and there is no going back now. 

How serious is the threat of voice/audio cloning? Is this the next disinformation tool we should be wary of? Are there other tools or techniques we should be mindful of?

CW: Voice cloning technology is now widely available, with a passable rate of authenticity. We need to be very wary and bolster our authentication processes to take this into account. It is no longer costly nor time-intensive to create a voice clone making it widely available with a low barrier to entry. This is not yet true of video clones, which are much more expensive and complex to create, but we should be prepared for the time when it is as simple to do as audio has already become. 

We have not quite reached the ability to voice clone in real-time, but I expect we will have this ability before too long. The current abuses have all been financially motivated, so the best approach is to always verify the identity of someone asking for a wire transfer, crypto investment, or other money transmission using a different method of communication using contact methods you have previously established. 

Can deepfakes really affect the outcomes of polls in general, and for Singaporeans in particular as they head to a general election this year?

CW: People should only rely on information from verified sources rather than social media. It is tempting to trust content shared by your friends and loved ones on social platforms, but these tools are being weaponized at scale and can fool even those you trust. 

If you see a video or audio clip that makes you angry or confused about the message you should search news outlets for coverage. Most media organizations will point out fakes that have achieved popularity and if something is truly controversial would confirm the authenticity with experts or eyewitness accounts.

How can the law and regulations keep up with disinformation, especially during election periods?

CW: I cannot comment on legal strategies, but the law needs to be crafted with the understanding that this technology exists, is accessible, and it unlikely to be eliminated.

Share:

PreviousWhen do rival ransomware-as-a-service groups co-operate in competition?
NextSurvey indicates levels of banking security and customer trust in Indonesia

Related Posts

Humans are the weak cybersecurity link. And humans can be the mitigators …

Humans are the weak cybersecurity link. And humans can be the mitigators …

Monday, December 21, 2020

Who on earth would want to abuse cheery emojis to harm people 🤕?

Who on earth would want to abuse cheery emojis to harm people 🤕?

Thursday, July 20, 2023

Risk of Shared Accounts with your housemates

Risk of Shared Accounts with your housemates

Tuesday, September 1, 2020

Making the healthcare sector threat aware

Making the healthcare sector threat aware

Tuesday, August 4, 2020

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    With only a small IT team, the digital transformation has united operations across 30 locations, …Read more
  • Automating border control and security with facial recognition technology

    Automating border control and security with facial recognition technology

    Indonesia Immigration & Seaport Authorities enhances security and speeds up border control queues at Batam …Read more
  • Securing wealth advisory services without unnecessary friction: Endowus

    Securing wealth advisory services without unnecessary friction: Endowus

    The wealth advisory platform demonstrates its non-negotiable commitment to a robust security posture through partnering …Read more
  • LifeTech group sets up next-gen security operations center in Malaysia

    LifeTech group sets up next-gen security operations center in Malaysia

    By partnering with a unified cybersecurity platform, the firm will be offering cost-effective advanced SOC …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.