Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Admitad Launches OEM Advertising Division to Drive Mobile Growth throu...
Navigating blockchain adoption amid rising security challenges
Scattered Spider: still spinning phishing webs on corporate land?
TaiPei-based Hong Tong Technology Acquires Initio’s Entire Encry...
Do not let hackers halt your plant: Checklists for reviewing OT cyber ...
LOGIN REGISTER
CybersecAsia
  • Conference 2025
  • Features
    • Featured

      Navigating blockchain adoption amid rising security challenges

      Navigating blockchain adoption amid rising security challenges

      Wednesday, May 14, 2025, 12:32 PM Asia/Singapore | Features
    • Featured

      Backups are not enough for cyber resilience

      Backups are not enough for cyber resilience

      Monday, May 5, 2025, 4:49 PM Asia/Singapore | Features
    • Featured

      MSPs the first line of defense for APAC SMEs

      MSPs the first line of defense for APAC SMEs

      Tuesday, April 15, 2025, 1:30 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2024
  • Directory
  • E-Learning

Select Page

LOGIN REGISTER
  • Conference 2025
  • Features
    • Featured

      Navigating blockchain adoption amid rising security challenges

      Navigating blockchain adoption amid rising security challenges

      Wednesday, May 14, 2025, 12:32 PM Asia/Singapore | Features
    • Featured

      Backups are not enough for cyber resilience

      Backups are not enough for cyber resilience

      Monday, May 5, 2025, 4:49 PM Asia/Singapore | Features
    • Featured

      MSPs the first line of defense for APAC SMEs

      MSPs the first line of defense for APAC SMEs

      Tuesday, April 15, 2025, 1:30 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2024
  • Directory
  • E-Learning
Tips

Tips for detecting and neutering online scams amid formidable AI-powered threats

By L L Seow | Thursday, April 24, 2025, 11:15 AM Asia/Singapore

Tips for detecting and neutering online scams amid formidable AI-powered threats

After its CEO urged stronger company-wide cybersecurity ethos, one firm is sharing cyber tips for users to combat AI-driven scams effectively.

With AI lowering the barrier to entry, even low-skilled attackers can generate sophisticated scams, ranging from deepfake-driven phishing to AI-generated sham websites mimicking legitimate businesses.

What used to take scammers days or weeks to create will now take minutes. The larger a digital marketplace in any region, the more likely a proportional degree of attempted fraud will take place, it seems.

Therefore, it its Cyber Signals Issue 9, Microsoft has released a series of recommendations for the public to protect themselves against scams in general.

Recommendations

  • Strengthen employer authentication: Fraudsters often hijack legitimate company profiles or create fake recruiters to deceive job seekers. To prevent this, job platforms should introduce multifactor authentication for employer accounts, making it harder for unauthorized users to gain control.
  • Monitor for AI-based recruitment scams: Companies should deploy deepfake detection algorithms to identify AI-generated interviews where facial expressions and speech patterns may not align naturally.
  • Be cautious of job listings that seem too good to be true: Verify the legitimacy of websites by checking for secure connections (https) and using tools that detect URL spoofing or mistyped URL addresses during web searches. Employment offers that include requests for payment, and a lack of formal communication platforms, can all be indicators of fraud. Legitimate employers use official company platforms for HR communications. Always handle personal and sensitive information over secure platforms.
  • Avoid providing personal information or payment details to unverified sources: Look for red flags in job listings, such as requests for payment or communication through informal platforms such as text messages, social media apps, non-business email accounts, or requests to contact someone on a personal device for more information. Unsolicited SMS and email messages offering high-paying jobs requiring minimal qualifications are typically fraudulent. Avoid sharing personal or financial information, especially banking details and login credentials.
  • Avoid providing personal information or payment details to unverified sources: Look for red flags in job listings, such as requests for payment or communication through informal platforms such as text messages, social media apps, non-business email accounts, or requests to contact someone on a personal device for more information. Unsolicited SMS and email messages offering high-paying jobs requiring minimal qualifications are typically fraudulent. Avoid sharing personal or financial information, especially banking details and login credentials.

For increasing safety during online shopping, the public can heed the following reminders:

  • Do not let pressure tactics trick you: Be wary of “limited-time” deals and countdown timers in high pressure ads on any platform.
  • Click on verified ads only: Many scam sites spread through AI-optimized social media ads. Cross-check domain names and reviews before attempting to even read or interact with their ads.
  • Be skeptical of social proof: Nowadays, scammers can use AI-generated reviews, influencer endorsements, and testimonials to gain your trust and exploit it. Never trust any claims without cross-checking them against reliable information sources.

General cybersecurity tips

As a major producer of major operating systems, browsers, cloud resources and software used at many levels of business, Microsoft is under a renewed heavy commitment to improving cybersecurity for products and practices specific to its own user base:

Users of Microsoft Edge should take advantage of their machine learning “Scareware Blocker” that detects alarming popup ads pretending to be system messages warning people that their system has been compromised. These attacks try to frighten users into calling fraudulent support numbers or downloading harmful software. Enabling the Scareware Blocker allows the Edge browser to automatically detect and stop these attacks or remind the user not to fall for the scam alert.

At any time, if a user still receive an unsolicited offer from some website or person purporting to offer tech support to you after claiming your system is at risk, it is likely a scam. Always reach out to trusted sources for tech support. If scammers claim to be from Microsoft, report the incident at https://www.microsoft.com/reportascam

In January 2025, a new fraud prevention policy was introduced throughout the firm: all product teams must now perform fraud prevention assessments and implement fraud controls as part of their design process. This “Secure Future Initiative” involves various efforts that Microsoft users should take advantage of:

  • Domain impersonation protection: This system uses deep-learning technology at the domain creation stage, to help protect against fraudulent e-commerce websites and fake job listings. Even the firm’s career management website now has AI-powered functions to detect the planting of fake jobs by malicious users.
  • Public-private cybersecurity initiatives: Organizations and institutions wishing to tipoff the firm’s Digital Crimes Unit about new scam trends or campaigns can now leverage the firm’s ties with global law enforcement agencies.
  • Quick Assist protection initiatives: The dangers of Window’s Quick Assist feature have been addressed through additional safeguards such as digital fingerprinting, a “Remote Help” resource, and other functions that obviate the risks of enabling strangers to access a computer remotely. In what is called “blocking of full control requests”, Quick Assist now includes warnings and requires users to check a box acknowledging the security implications of sharing their screen. This adds a layer of helpful “security friction,” by prompting users that may be multi-tasking or preoccupied to take notice when attempting to complete an authorization step.

Share:

PreviousNorth Korean hackers target crypto developers, steal billions using sophisticated malware
NextPhilippines Security Soars with Latest F-16 Platform: U.S. Approval Paves Way for Enhanced Air Power Capabilities and Self-Reliant Defense Posture

Related Posts

Insurance giant appoints startup to provide rebated cybersecurity services

Insurance giant appoints startup to provide rebated cybersecurity services

Friday, March 6, 2020

Thai citizens to adopt ‘one of the world’s most secure e-passports’

Thai citizens to adopt ‘one of the world’s most secure e-passports’

Tuesday, August 11, 2020

Malware campaign harnesses the “deepest infrared image of the universe” for cyberattacks

Malware campaign harnesses the “deepest infrared image of the universe” for cyberattacks

Wednesday, September 7, 2022

Mac users should not be complacent about malware and cyberattacks

Mac users should not be complacent about malware and cyberattacks

Monday, June 22, 2020

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    With only a small IT team, the digital transformation has united operations across 30 locations, …Read more
  • Automating border control and security with facial recognition technology

    Automating border control and security with facial recognition technology

    Indonesia Immigration & Seaport Authorities enhances security and speeds up border control queues at Batam …Read more
  • Securing wealth advisory services without unnecessary friction: Endowus

    Securing wealth advisory services without unnecessary friction: Endowus

    The wealth advisory platform demonstrates its non-negotiable commitment to a robust security posture through partnering …Read more
  • LifeTech group sets up next-gen security operations center in Malaysia

    LifeTech group sets up next-gen security operations center in Malaysia

    By partnering with a unified cybersecurity platform, the firm will be offering cost-effective advanced SOC …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.