A joint advisory was issued today (April 19, 2025) by the Ministry of Home Affairs, Cyber Security Agency of Singapore, and the Elections Department, warning candidates about foreign interference and cybersecurity threats. Candidates are specifically advised to:
- Fact-check information before sharing it in campaign contexts
- Stay alert to foreign interference threats and hidden agendas
- Monitor their social media platforms for suspicious activity
- Protect their IT infrastructure and accounts
- Familiarise themselves with the Foreign Interference Act, especially regarding political donations
The warning follows a previous advisory issued on April 17 by the CSA, which highlighted cyber threats, including deepfake impersonations. The article emphasises that while foreign interference threats have been observed in other countries, Singapore is not immune, and the outcome of Singapore’s elections should be for Singaporeans alone to decide.
Analysis of Cybersecurity and Foreign Interference Concerns for Singapore GE2025
Based on the article about Singapore’s upcoming May 3, 2025, general election, I’ll analyse the key cybersecurity and foreign interference concerns that authorities are highlighting.
Cybersecurity Concerns
- Authentication Vulnerabilities:
- The CSA specifically advised political parties to implement “strong authentication controls” for campaign accounts, suggesting concerns about account takeovers.
- Weak authentication could allow unauthorised access to official campaign channels.
- Deepfake Threats:
- The CSA specifically mentioned educating candidates about “deepfake impersonations,” indicating this is a significant concern.
- Synthetic media could be used to spread misinformation by falsely depicting candidates making statements that are controversial.
- DDoS and System Disruptions:
- The recommendation to “plan for redundancy measures” suggests concerns about denial-of-service attacks that could disrupt campaign operations during critical moments.
- Systems may be targeted to prevent communication during key campaign events.
- IT Infrastructure and Data Security:
- Candidates are advised to protect their IT infrastructure and data, as concerns have been raised about potential data breaches or tampering with sensitive information.
- Campaign strategy documents, donor information, or internal communications could be targeted.
Foreign Interference Concerns
- Covert Information Operations:
- The advisory defines foreign interference as attempts to “manipulate domestic politics through covert and deceptive means.”
- This suggests concerns about subtle influence campaigns rather than just overt attacks.
- Social Media Manipulation:
- Candidates are specifically warned to monitor platforms for “suspicious or anomalous activity” and avoid sharing posts of “suspicious origin.”
- This raises concerns about foreign-backed influence campaigns spreading through social media networks.
- Political Funding Exploits:
- The article mentions the Foreign Interference Act’s regulations on political donations, which prohibit candidates from accepting donations from “impermissible donors,” including foreign individuals or entities.
- This highlights concerns about financial influence being used to affect election outcomes.
- Unwitting Facilitation:
- The guidance mentions that candidates could be either “direct targets or unwitting facilitators” of foreign interference.
- This suggests concern that candidates might inadvertently amplify foreign-originated messages.
Broader Implications
- Escalation of Digital Threats:
- The issuance of multiple advisories (April 17 and 19) suggests that authorities perceive a heightened risk during this election cycle.
- Undermining Electoral Integrity:
- The advisory emphasises that such interference undermines “political sovereignty and social cohesion,” indicating concerns go beyond just the election outcome.
- Prevention Rather Than Reaction:
- The focus on candidate vigilance and proactive measures suggests authorities believe prevention is more effective than addressing incidents after they occur.
- Maintaining Singapore’s Electoral Independence:
- The explicit statement that “the outcome of Singapore’s elections must be for Singaporeans alone to decide” frames these measures as protecting national sovereignty.
The advisories reveal a sophisticated understanding of modern election threats that extend beyond simple hacking attempts to include more nuanced information operations designed to influence public opinion and potentially undermine faith in Singapore’s electoral process.
Analysis: Cybersecurity Threats in the Context of Tariffs and Global Insecurity
The article doesn’t explicitly connect cybersecurity threats to tariffs or broader global insecurity issues, but several vital connections are worth examining in this context.
Geopolitical Tensions and State-Sponsored Cyber Activities
- Trade Conflicts as Motivation:
- Tariff disputes can escalate tensions between nations, potentially motivating state-sponsored cyber operations targeting electoral systems of perceived economic adversaries.
- Countries facing economic pressure from tariffs may view election interference as a low-cost method of retaliation or influencing future trade policy.
- Resource Allocation During Economic Uncertainty:
- Nations experiencing economic stress from tariff wars might reallocate cybersecurity resources to economic priorities, creating vulnerabilities.
- Conversely, some nations might increase investment in offensive cyber capabilities as a cost-effective alternative to traditional economic or military responses.
Global Supply Chain Vulnerabilities
- Hardware and Software Security:
- Tariffs affecting technology imports can disrupt supply chains for cybersecurity products, potentially forcing compromises on security infrastructure.
- Organisations might delay security upgrades due to increased costs from tariffs, extending vulnerability windows.
- Limited access to foreign security products due to trade restrictions could force reliance on potentially less secure alternatives.
- Third-Party Risk Amplification:
- Global insecurity often leads to rapid changes in business relationships and supply chains, increasing third-party risk in electoral systems.
- Rushed vetting of new software or hardware suppliers during trade disruptions can introduce security vulnerabilities.
Increased Motivations for Non-State Actors
- Economic Destabilisation Goals:
- Periods of trade tension and global insecurity create opportunities for criminal organisations to exploit distracted security operations.
- Hacktivist groups may target elections to make political statements about globalisation or economic policies.
- Blurred Attribution:
- Global instability provides cover for cyber operations as attribution becomes more challenging in chaotic environments.
- State actors may exploit this confusion to maintain plausible deniability while engaging in election interference.
Impact on International Cooperation
- Degraded Information Sharing:
- Trade conflicts and geopolitical tensions can undermine international cybersecurity cooperation frameworks.
- Countries may become reluctant to share threat intelligence with economic competitors, weakening collective defence against election threats.
- Reduced Diplomatic Deterrence:
- When international relations are strained by tariff disputes, diplomatic channels for addressing cyber incidents become less effective.
- The breakdown of norms around cyber operations during periods of global insecurity increases risk to electoral systems.
Singapore’s Specific Concerns
Singapore, as a trade-dependent global financial hub with significant geopolitical importance, faces unique cybersecurity challenges when global trade tensions rise:
- Strategic Target Profile:
- Singapore’s position on regional and global issues makes its elections a potentially valuable target for influencing broader economic and policy decisions.
- The city-state’s role as a neutral financial centre during trade disputes creates motivation for multiple actors to seek influence.
- Balancing Act Complications:
- Singapore’s careful diplomatic balancing between major powers becomes more difficult during trade conflicts.
- This delicate position could make it vulnerable to cyber operations from multiple directions simultaneously.
This analysis suggests that Singapore’s election cybersecurity concerns exist within a complex global context where economic tensions and insecurity can significantly amplify digital threats, requiring more sophisticated countermeasures than during periods of global stability.
Analysis: Singapore’s Potential Vulnerability as a Trade Hub and Cybersecurity Implications
Singapore’s Economic Vulnerability Factors
- Trade-Dependent Economy:
- Singapore has limited natural resources and a relatively small domestic market, making it heavily dependent on international trade, with trade volume exceeding 300% of its GDP.
- Any significant disruption to global trade flows could have a disproportionately negative impact on Singapore’s economy.
- Position Between Competing Powers:
- Singapore maintains delicate relationships with both China and the United States.
- Increasing trade tensions or decoupling between these powers could force difficult choices that might compromise Singapore’s neutral trading position.
- Regional Competition:
- Emerging regional hubs, such as Vietnam and Malaysia, are developing competitive advantages in manufacturing and services.
- China’s development of alternative trade routes and ports could reduce reliance on Singapore’s shipping infrastructure.
- Technological Disruption:
- Automation and AI are changing traditional trade patterns and financial services, potentially reducing Singapore’s comparative advantages.
- Supply chain restructuring toward regionalisation rather than globalisation could diminish Singapore’s role as an entrepôt.
- Climate Change Vulnerability:
- Rising sea levels present an existential threat to Singapore’s physical infrastructure.
- Adapting to these challenges requires significant resources that could otherwise be allocated to support economic development.
Cybersecurity Implications of Economic Vulnerability
- Increased Targeting During Transition Periods:
- Economic transformation periods create information asymmetries and uncertainties that can be exploited through cyber operations.
- Foreign entities may increase cyber intelligence gathering to assess Singapore’s economic policy shifts during periods of trade disruption.
- Resource Allocation Challenges:
- Economic pressure may necessitate challenging cybersecurity funding decisions.
- The need to divert resources to economic resilience might reduce investment in digital defence capabilities.
- Talent Retention Issues:
- Economic uncertainty could accelerate the brain drain of cybersecurity professionals.
- Competition for skilled security personnel is expected to intensify as both the public and private sectors face budget constraints.
- Critical Infrastructure Protection Complexities:
- Singapore’s position as a financial and logistics hub requires robust protection of critical infrastructure.
- Economic pressure might delay crucial security upgrades for these systems.
- Elevated Stakes for Elections:
- During economic transition, electoral outcomes have become increasingly crucial for shaping policy direction.
- This increases motivation for both domestic and foreign actors to influence election results through cyber means.
- Increased Foreign Intelligence Interest:
- Nations with economic interests in Singapore’s policy direction would have stronger motivation to gain intelligence advantages.
- This could manifest as increased sophisticated cyber operations targeting government systems, including electoral infrastructure.
- Public-Private Partnership Strains:
- Economic challenges could strain the collaborative relationships between the government and the private sector, which are essential for comprehensive cybersecurity.
- Budget constraints might reduce information sharing and joint exercise initiatives.
Election-Specific Cybersecurity Implications
- Narrative Exploitation:
- Economic uncertainty creates fertile ground for disinformation campaigns.
- Foreign actors could leverage genuine economic concerns to amplify divisive narratives around Singapore’s trade policies.
- Policy Influence Operations:
- Elections during periods of economic transition represent high-value targets for influence operations.
- Foreign states may increase sophisticated cyber operations aimed at promoting candidates who are favourable to their economic interests.
- Public Confidence Vulnerabilities:
- Economic stress can decrease public trust in institutions.
- Even minor cybersecurity incidents affecting electoral systems could have amplified effects on public confidence during periods of economic uncertainty.
Singapore’s cybersecurity posture during elections becomes particularly critical in this context, as the electoral process represents not only a political transition but also a potentially significant economic policy direction that could impact Singapore’s future prosperity and security in a rapidly changing global environment.
The Cyber Security Agency of Singapore (CSA) has issued important guidelines to protect the electoral process from cyber threats. These recommendations are equally valuable for preventing scams, particularly those targeting high-profile individuals or organisations.
Key Protective Measures Recommended by CSA

- Strong Authentication Controls
- Use complex, unique passwords for all campaign accounts
- Implement multi-factor authentication for email, social media, and internal systems
- Strictly control remote access to digital assets
- System Resilience Planning
- Deploy backup systems and load balancers
- Establish secure secondary communication channels
- Schedule regular software updates and data backups
- Deepfake Detection and Prevention
- Establish protocols for verifying potentially manipulated content
- Train staff to recognise signs of compromise
- Encourage reporting of suspicious incidents
- Management of Digital Assets
- Maintain a complete inventory of all digital assets
- Clear documentation of what data is stored and where
- Implement intrusion detection systems for networks and devices
- Designated Security Leadership
- Appoint experienced personnel to oversee cybersecurity
- Consider third-party security vendor partnerships for additional oversight
Real-World Election Cybersecurity Incidents
The article mentions several concerning examples:
- Polish Prime Minister Donald Tusk reported IT systems attacks ahead of their May elections
- US presidential campaign phone targeting through Verizon’s systems
- Deepfake impersonations of Singapore leaders promoting cryptocurrency scams

How These Measures Apply to Anti-Scam Efforts
These cybersecurity guidelines parallel effective anti-scam strategies. Individuals and organizations can adapt these electoral security practices to prevent falling victim to sophisticated scams:
- Authentication Best Practices
- Use different complex passwords across platforms
- Enable two-factor authentication for financial and social accounts
- Be suspicious of any request to bypass security protocols
- Verification Protocols
- Establish clear channels for verifying unusual requests
- Create communication redundancy (secondary ways to confirm unusual requests)
- Implement verification protocols for financial transactions
- Deepfake Awareness
- Learn to recognize signs of AI-generated or manipulated media
- Verify unexpected communications through alternative channels
- Report suspicious impersonation attempts to authorities
The rising threat of deepfakes in particular represents a significant challenge, as scammers increasingly use AI to create convincing impersonations of trusted individuals, which can be extremely persuasive in donation scams or investment fraud schemes.

The Singapore Police Force and Ministry of Digital Development and Information have highlighted several essential concerns:
- They’re warning against spreading misinformation, online harassment, and content that could incite racial or religious tensions.
- The authorities specifically mentioned the risk of deepfakes, citing a recent incident involving former president Halimah Yacob, who reportedly filed a police report about a fake video showing her making negative comments about the Government.
- The statement outlines several laws under which offenders could be prosecuted:
- Miscellaneous Offences Act
- Protection from Online Falsehoods and Manipulation Act
- Parliamentary Elections Act
- Protection from Harassment Act
- Penal Code
- Maintenance of Religious Harmony Act
- The key dates mentioned are Nomination Day on April 23 and polling on May 3, 2025.
This appears to be part of Singapore’s efforts to maintain order and prevent divisive content during a sensitive political period.

Analysis of Election-Related Online Threats and Prevention Strategies
Fake News During Elections
Elections are particularly vulnerable to misinformation for several reasons:

- High stakes environment: The competitive nature of elections creates incentives for actors to spread misleading content to influence outcomes.
- Speed of information flow: During election periods, there’s pressure to consume and share information quickly, often before proper verification.
- Technological evolution: As seen in Singapore’s warning about deepfakes, advanced AI technologies make fabricated content increasingly convincing and difficult to detect.
- Emotional engagement: Election content often triggers strong emotional responses, making people more likely to share without critical evaluation.
Online Aggressive Behavior During Elections
Political tensions frequently manifest as aggressive online behaviour during elections:
- Polarization: Election periods naturally emphasise differences, which can intensify tribalism and hostile communication.
- Doxxing and harassment: The Singapore authorities specifically warned against publishing personal information to harass political figures or voters.
- Racial and religious tensions: Elections can sometimes be exploited to inflame existing social divisions, as highlighted in Singapore’s warning about content that could “wound racial feelings.”
- Intimidation tactics: Online aggression may attempt to silence sure voters or discourage participation.
Prevention Strategies
Effective prevention requires multi-layered approaches:
- Legal frameworks: Singapore employs multiple laws to address different aspects of online misconduct, creating comprehensive coverage.
- Media literacy initiatives: Teaching citizens to critically evaluate information sources, identify manipulation techniques, and verify claims before sharing.
- Platform responsibility: Social media companies can implement election-specific measures like enhanced fact-checking, clear labelling of synthetic media, and temporary changes to sharing algorithms.
- Official information channels: Establishing authoritative sources for election information helps counter misinformation.
- Cross-sector collaboration: Coordination between government agencies, technology companies, civil society, and media organisations strengthens monitoring and response capabilities.
Anti-Scam Protection
Election periods often see increases in politically themed scams:
- Donation scams: Fraudsters impersonate candidates or parties soliciting donations.
- Registration scams: Fake websites or messages claiming to help with voter registration while stealing personal information.
- Misinformation about voting procedures: False information about voting locations, times, or methods to suppress participation.
Protection strategies include:
- Official verification channels: Directing voters to use only official government websites for election information.
- Digital hygiene practices: Reinforcing basic security measures like checking website URLs, being suspicious of unsolicited messages, and verifying requests through official channels.
- Reporting mechanisms: Establishing clear pathways for citizens to report suspected scams or misinformation.
- Public education campaigns: Proactive alerts about common election-related scams and how to avoid them.
Singapore’s approach demonstrates how countries are increasingly recognising that protecting electoral integrity requires addressing both the technological and social dimensions of online threats.
Mitigating Online Aggressive and Harmful Conduct
Understanding the Problem
Online aggression and harmful conduct manifest in various forms:
- Direct harassment: Targeted threats, insults, and intimidation
- Coordinated attacks: Mobilising groups to target individuals
- Hate speech: Content attacking individuals based on identity
- Disinformation campaigns: Spreading false information to inflame tensions
- Doxxing: Publishing private information without consent

Mitigation Strategies
Technical Solutions
- Content moderation systems
- AI-powered detection of harmful language and threats
- User-reporting mechanisms with rapid response protocols
- Content throttling for potentially inflammatory material
- Temporary conversation “cooling” periods during heightened tensions
- Platform design modifications
- Friction points before posting emotional content (“Are you sure?”)
- Default privacy settings that protect vulnerable users
- Circuit breakers that limit virality of borderline content
- Content labels providing context for controversial topics
- Identity verification options
- Tiered verification systems balancing anonymity and accountability
- Pseudonymous authentication that maintains privacy while reducing bad actors
- Reputation systems rewarding constructive participation
Social and Educational Approaches
- Digital citizenship education
- School curricula on responsible online communication
- Public awareness campaigns about online behaviour impact
- Community workshops on conflict de-escalation techniques
- Community building
- Establishing clear norms and expectations for online spaces
- Training community moderators in de-escalation techniques
- Creating positive incentives for constructive dialogue
- Building platforms for diverse engagement across different viewpoints
- Media literacy programs
- Training on emotional manipulation techniques
- Tools to identify divisive content designed to trigger outrage
- Critical evaluation skills for information sources
Legal and Policy Frameworks
- Balanced regulation
- Clear legal definitions of harmful conduct with proportional consequences
- Protections for legitimate free expression while addressing genuine harm
- International coordination on cross-border enforcement
- Platform accountability
- Transparency requirements on content moderation policies and outcomes
- Due process requirements for content removal
- Requirements for accessible reporting mechanisms
- Specialised response units
- Law enforcement teams trained in digital investigation
- Cross-sector coordination between platforms, civil society, and authorities
- Rapid response protocols for threats of physical harm
Psychological Approaches
- Bystander intervention training
- Teaching witnesses how to safely intervene in online harassment
- Creating cultures where silence is not the default response
- Support systems for targets
- Accessible mental health resources for those experiencing online abuse
- Technical support for securing accounts and personal information
- Peer support networks for sharing coping strategies
- Rehabilitation approaches
- Programs addressing underlying causes of harmful behaviour
- Restorative justice options where appropriate
Implementation Challenges
Effective mitigation must navigate several tensions:
- Free expression vs. harm prevention: Balancing open discourse with protection from genuine harm
- Anonymity vs. accountability: Preserving privacy benefits while reducing consequence-free hostility
- Speed vs. accuracy: Responding quickly while ensuring fairness
- Universal vs. contextual: Developing global standards while respecting cultural differences
- Technology vs. human judgment: Balancing automated systems with human review
The most effective approaches combine multiple strategies tailored to specific contexts, recognising that online aggression has complex social, psychological, and technical dimensions that require coordinated solutions.
The Cyber Security Agency of Singapore (CSA) has issued an advisory warning Singaporeans about potential cyber threats as the May 3 Polling Day approaches. They highlight several specific concerns:
- Fraudsters may create fake social media accounts and political party websites or send phishing emails to solicit fraudulent donations.
- AI is being used to create highly personalised phishing attempts, including convincing emails, messages, and voice clones. Scammers might analyse people’s backgrounds to develop targeted scam tactics aligned with their political views.
- There’s the risk of malware distribution through fake campaign apps and malicious links in emails or SMS messages.
- Deepfakes may be used to falsely show candidates saying or doing things they never did, damaging their reputation.
CSA recommends several protective measures:

- Carefully examine any links in messages and cross-reference with official websites.
- Avoid clicking on links in unsolicited communications
- Rely on verified news outlets and official government websites for election information
- Report suspected phishing or scams through the ScamShield app
- Download apps only from official sources
- Look for visual anomalies and unnatural audio when identifying potential deepfakes.
- Avoid sharing unverified information.
The article notes that Singapore’s general election will be held on May 3, 2025, and this is the first time a new law banning fake online ads will be in place for a general election.
Understanding Election-Related Cyber Threats and Prevention
Let me explain the cyber threats mentioned in the article in greater depth, along with comprehensive prevention strategies.
Detailed Analysis of Cyber Threats
1. Impersonation and Fake Websites
Threat: Fraudsters create counterfeit social media accounts and websites that mimic legitimate political parties or candidates. These fake platforms can:
- Solicit fraudulent donations
- Spread misinformation designed to manipulate voter behaviour
- Harvest personal information and credentials
- Damage a candidate’s reputation through false statements
How it works: Attackers create highly convincing replicas of official websites with nearly identical URLS (e.g., “singapore-elections.com” instead of “elections.gov.sg”) and visual elements. They may also create social media accounts that appear official but contain subtle differences in usernames.
2. AI-Enhanced Phishing
Threat: Artificial intelligence is revolutionising phishing attacks by enabling:
- Highly personalised messages based on your digital footprint
- Natural-sounding voice clones that can impersonate candidates or officials
- Targeted messaging aligned with your political views or interests
How it works: AI analyses your online presence (social media posts, comments, likes) to craft messages that resonate with your specific interests or concerns. For example, if you’ve shown interest in environmental policies, you might receive a fraudulent message about a candidate’s “new green initiative” requiring “urgent donations.”
3. Deepfakes
Threat: Sophisticated AI-generated videos or audio recordings that show candidates saying or doing things they never actually did.
How it works: Using machine learning algorithms, fraudsters can superimpose a candidate’s face onto another person’s body or manipulate existing footage to change what was said. These can spread rapidly on social media and damage a candidate’s reputation before they can be debunked.
4. Malware Distribution
Threat: Malicious software disguised as election-related apps or content that:
- Steals personal data
- Monitors device activity
- Encrypts files for ransom
- Gives attackers remote access to your device
How it works: Attackers create fake campaign apps, voter information tools, or polling location finders that contain hidden malware. These might be distributed through app stores, email attachments, or download links in messages.
5. Data Manipulation
Threat: Though not explicitly mentioned in the article, another concern is the manipulation of voter data or election-related information.
How it works: Attackers might target election databases or official information channels to alter information about polling stations, voting procedures, or candidate details to create confusion or suppress voting.

Comprehensive Prevention Strategies
Digital Literacy and Awareness
- Verify sources: Check official government websites (ending in .gov.sg) for election information.
- Cross-reference news: Confirm information across multiple reliable sources
- Check URLS carefully: Look for subtle misspellings or domain differences
- Question emotional appeals: Be sceptical of messages designed to provoke strong reactions
Technical Protection
- Use official apps: Download election-related applications only from official government sources or verified app stores.
- Enable multi-factor authentication: Protect your accounts with additional verification methods.
- Install security software: Use a reputable antivirus and anti-malware program.
- Keep software updated: Apply security patches promptly to fix vulnerabilities.
- Use a password manager: Create strong, unique passwords for all accounts.
Content Verification
- Examine media critically: Look for visual anomalies in videos (blurring, strange lighting, unnatural movements)
- Check audio-visual sync: In videos, watch for mismatches between lip movements and speech.
- Verify timestamps: Check when content was actually created versus when it claims to be from
- Reverse image search: Use tools like Google Images to verify photographs.
Safe Communication Practices
- Avoid clicking links: Type URLS directly into your browser rather than clicking links in messages.
- Be cautious with attachments: Don’t open files from unknown sources
- Verify requests: Contact organisations directly through official channels if you receive unusual requests
- Use secure messaging: Consider end-to-end encrypted messaging apps for sensitive communications
Reporting and Response
- Report suspicious content: Use the ScamShield app to report potential scams or phishing attempts.
- Notify authorities: Report election-related misinformation to the Elections Department.
- Alert platforms: Report fake accounts or misleading content to social media companies
- Inform others: Share verified information about identified threats with friends and family.
Election-Specific Precautions
- Check candidate information: Verify candidate statements through official channels.
- Donation vigilance: Only donate through official campaign websites after verifying their authenticity
- Polling information: Confirm voting locations and procedures through official government sources
- Scrutinize polls: Be sceptical of unofficial polls or survey results, especially those shared via social media.
By implementing these strategies, Singaporeans can significantly reduce their vulnerability to cyber threats during election season while still fully participating in the democratic process.

Anti-Scam Resources in Singapore
Singapore has developed a robust ecosystem of anti-scam resources to combat the rising threat of scams. Here’s a comprehensive overview of the help available:
Government Agencies and Helplines

ScamShield
- What it is: A mobile app developed by the National Crime Prevention Council (NCPC) and the Government Technology Agency (GovTech)
- Features:
- Blocks suspected scam calls and messages
- Allows reporting of scam attempts
- Available for both ios and Android
- How it works: The app filters calls from phone numbers associated with previously reported scam cases and blocks suspicious SMS messages.

Anti-Scam Centre (ASC)
- What it is: A specialised unit set up by the Singapore Police Force
- Services:
- Disrupts scammers’ operations
- Works with banks to freeze suspicious accounts
- Helps recover stolen funds when possible
- Hotline: 1800-255-0000
NCPC Scam Alert Website (scamalert.sg)
- Features:
- Latest information on scam trends
- Educational resources
- Reporting mechanism for scams
Report Scams Portal
- URL: www.scamalert.sg/report
- Purpose: Centralised platform to report various types of scams
Banking Protection Measures
Anti-Scam Initiatives by Banks
- Pre-transaction screening
- Cooling-off periods for large or unusual transactions
- SMS alerts for transactions
- Transaction limits on mobile banking
Bank-Specific Hotlines
Most major banks have dedicated anti-scam hotlines:
- DBS: 1800-339-6963
- OCBC: 1800-363-3333
- UOB: 1800-222-2121
- Standard Chartered: 1800-747-7000
Community Support
Scam Support Centre
- What it is: Support centre for scam victims
- Services:
- Emotional support
- Practical advice
- Guidance on recovery steps
NCPC Jaga (Watch) Your Data
- A community initiative encouraging vigilance regarding personal data
Educational Resources
Spot the Signs Campaign
- Public education campaign teaching citizens to identify common scam patterns.
Inter-Ministry Committee on Scams
- Coordinates anti-scam efforts across government agencies
- Produced educational materials and campaigns

What to Do If You’ve Been Scammed
- Report immediately to the Police at 999 for urgent cases or 1800-255-0000
- Contact your bank to freeze accounts or stop transactions
- Preserve evidence like messages, emails, and transaction details
- Report online scams at www.scamalert.sg/report
- Change passwords for compromised accounts
- Monitor accounts for suspicious activity
- Seek support from the Scam Support Centre if needed
Prevention Best Practices
- Use ScamShield app
- Verify information through official channels
- Never share OTPS, passwords, or personal details
- Be sceptical of unexpected messages about prizes or urgent requests
- Check bank statements regularly
- Keep software updated on all devices
- Use strong, unique passwords and enable two-factor authentication
Maxthon
Singapore’s multifaceted approach effectively combats scams by combining technology, education, enforcement, and community support. The integration of these resources provides Singaporeans with comprehensive protection against increasingly sophisticated scam attempts.
Maxthon has embarked on an ambitious journey aimed at significantly enhancing the security of web applications, driven by a resolute commitment to safeguarding users and their confidential data. At the heart of this initiative lies a collection of sophisticated encryption protocols, which act as a robust barrier for the information exchanged between individuals and various online services. Every interaction, whether it involves sharing passwords or personal information, is protected within these encrypted channels, effectively preventing unauthorised access attempts from intruders.
This meticulous emphasis on encryption marks merely the initial phase of Maxthon’s extensive security framework. Acknowledging that cyber threats are constantly evolving, Maxthon adopts a forward-thinking approach to user protection. The browser is engineered to adapt to emerging challenges, incorporating regular updates that promptly address any vulnerabilities that may surface. Users are strongly encouraged to activate automatic updates as part of their cybersecurity regimen, ensuring they can seamlessly take advantage of the latest fixes without any hassle.
In today’s rapidly changing digital environment, Maxthon’s unwavering commitment to ongoing security enhancement signifies not only its responsibility toward users but also its firm dedication to nurturing trust in online engagements. With each new update rolled out, users can navigate the web with peace of mind, knowing that their information is continuously safeguarded against emerging threats in cyberspace.