
5 weeks jail and S$1.5K fine for man who tapped EZ-Link card on bus driver's face
SINGAPORE: A 53-year-old man has been sentenced to five weeks in prison and fined S$1,500 after he drunkenly made a scene on board a public bus, pushed an elderly commuter, and tapped his EZ-link card on the bus driver's face.
The incident occurred at around 7 p.m. on Mar 18 this year, on board a bus plying route 195. The court heard that the defendant, Wilson Loh, consumed eight bottles of beer from noon that day, then boarded the bus at 6 p.m. to get home.
He wanted to alight at the next stop, but when the driver stopped, Loh did not alight even though other commuters got off and on the bus. The driver then drove off, and Loh kicked up a ruckus, blaming the driver for making him miss his stop.
The driver explained that he had opened the door earlier, but Loh refused to listen and tapped the driver's face with the EZ-Link card in his hand. He continued to shout inside the moving bus as it made its way to the next stop.
A 75-year-old passenger also stepped forward to persuade Loh to calm down, but Loh pushed him away, causing the elderly man's mobile phone to fall. Fellow commuters called the police after seeing this, leading to Loh's arrest. document.addEventListener("DOMContentLoaded", () => { const trigger = document.getElementById("ads-trigger"); if ('IntersectionObserver' in window && trigger) { const observer = new IntersectionObserver((entries, observer) => { entries.forEach(entry => { if (entry.isIntersecting) { lazyLoader(); // You should define lazyLoader() elsewhere or inline here observer.unobserve(entry.target); // Run once } }); }, { rootMargin: '800px', threshold: 0.1 }); observer.observe(trigger); } else { // Fallback setTimeout(lazyLoader, 3000); } });
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


CNA
24 minutes ago
- CNA
147,000 customer records affected following data breach at Cycle & Carriage
SINGAPORE: A breach at Cycle & Carriage's database has affected about 147,000 records containing customer information, the car distributor said on Friday (Aug 1). In response to CNA's queries, a spokesperson from Cycle & Carriage said that it was alerted on Jul 14 to "unauthorised access" into its customer relationship management system by a threat actor who downloaded some customer information. "About 147,000 data records are affected. Most of the downloaded records have missing or partial information," added the spokesperson. The affected data records may contain names and contact information - such as email addresses and phone numbers - with about 2 per cent of them containing National Registration Identity Card (NRIC) numbers and deposit amounts. No banking or credit card information was divulged, the spokesperson said. "Once we became aware of the incident, we have taken measures to prevent further unauthorised access to the system. "A thorough investigation was carried out and forensic experts were activated to look into the possible causes of this unauthorised access," the spokesperson added. Apologising to affected customers, Cycle & Carriage said that the company has internal processes, protocols, and training in place to support data governance and cyber hygiene, but will continue to "review and refine these as needed" in light of the incident. The firm has lodged a police report and notified the Personal Data Protection Commission (PDPC). It has also begun to inform affected customers in batches from Wednesday. In an email sent to a customer on Thursday, which CNA has seen, the firm referred to a "cybersecurity incident" and added that it was still investigating the full scope of the breach. Customers were advised to be cautious of phishing activities or suspicious requests for personal information.


CNA
an hour ago
- CNA
Naming country linked to UNC3886 attack not in Singapore's best interest at this point in time: Shanmugam
SINGAPORE: While naming a specific country linked to cyber threat group UNC3886 is not in Singapore's interest at this point in time, the attack was still serious enough for the government to let the public know about the group, said Coordinating Minister for National Security and Minister for Home Affairs K Shanmugam on Friday (Aug 1). Speaking to reporters on the side of the Cyber Security Agency of Singapore's (CSA) Exercise Cyber Star, the national cybersecurity crisis management exercise, Mr Shanmugam said that when it comes to naming any country responsible for a cyber attack, 'we always think about it very carefully'. Responding to a question from CNA on reports tying the group to China, Mr Shanmugam said: 'Media coverage (and) industry experts all attribute UNC3886 to some country … Government does not comment on this. 'We release information that we assess is in the public interest. Naming a specific country is not in our interest at this point in time.' UNC3886 has been described by Google-owned cybersecurity firm Mandiant as a "China-nexus espionage group" that has targeted prominent strategic organisations on a global scale. Mr Shanmugam had announced on Jul 18 that Singapore is actively dealing with a "highly sophisticated threat actor" that is attacking critical infrastructure, identifying the entity as UNC3886 without disclosing if it was a state-linked actor. He said the threat actor poses a serious danger to Singapore and could undermine the country's national security, and added that it was not in Singapore's security interests to disclose further details of the attack then. When asked the following day about UNC3886's alleged links to China and possible retaliation for naming them, Mr Shanmugam, who is also Home Affairs Minister, said this was "speculative". "Who they are linked to and how they operate is not something I want to go into," he said. Responding to media reports in a Jul 19 Facebook post, the Chinese embassy in Singapore expressed its "strong dissatisfaction" at the claims linking the country to UNC3886, stating that they were "groundless smears and accusations against China". 'In fact, China is a major victim of cyberattacks," it wrote. "The embassy would like to reiterate that China is firmly against and cracks down (on) all forms of cyberattacks in accordance with law. China does not encourage, support or condone hacking activities." On Friday, Mr Shanmugam also gave his reasons for disclosing the identity of threat actors like UNC3886. 'We look at the facts of each case (and) the degree of confidence we have before we can name. And when we decide to name the threat actor, we look at whether it is in Singapore's best interest,' said Mr Shanmugam, who is also the home affairs minister. In this case, the threat, attack and compromise to Singapore's infrastructure was 'serious enough' and the government was confident enough to name UNC3886 as the perpetrators, he said. 'Here, we said this is serious. They have gotten in. They are compromising a very serious critical infrastructure. Singaporeans ought to know about it, and awareness has got to increase. And because of the seriousness, it is in the public interest for us to disclose,' said Mr Shanmugam. ATTACKS HAVE HAPPENED ELSEWHERE Mr Shanmugam was accompanied at Friday's exercise by Minister for Digital Development and Information Josephine Teo, who is also Minister-in-Charge of Cybersecurity. Held at the Singapore Institute of Technology in Punggol, the exercise saw teams from critical sector organisations tackle cybersecurity challenges based on key threats, such as advanced persistent threats (APTs) and attacks on critical systems. APTs are a type of prolonged cyberattack typically carried out by well-resourced threat actors. 'There're close to about 500 participants today. They come together, put a face to a name, exercise real life scenarios, things which have happened elsewhere,' said Mr Shanmugam, emphasising that such incidents are 'not theoretical'. During the event, Mr Shanmugam was shown a demonstration of an attack on a port, where crane operations were paralysed and energy supply was cut off. He was also briefed on the response plan for when the public transport system gets attacked, with millions of people commuting and the fare systems are targeted. 'You have to exercise, you have to bring people together. Government has got a high level of knowledge.' The private sector, meanwhile, is focused on getting things done for their business, he added. 'Now, they need their knowledge and abilities to also increase. So we've got to work together,' said Mr Shanmugam. Mrs Teo had announced earlier this week that owners of Singapore's critical information infrastructure will, from later this year, be required to report to CSA any incidents suspected to be caused by APTs. Mr David Koh, chief executive of CSA, said: 'With cyberattacks increasing in frequency and sophistication, it is important for the government to work closely with Singapore's critical sectors and companies to enhance crisis response capabilities and ensure the continual delivery of essential services.
Business Times
2 hours ago
- Business Times
Automotive distributor Cycle & Carriage suffers customer data breach
[SINGAPORE] The personal information of a number of customers of automotive distributor Cycle & Carriage Singapore (C&C) has been leaked in a data breach. Based on an e-mail seen by The Business Times and sent to the company's customers on Thursday (Jul 31), an unknown threat actor gained access to C&C's customer relationship management system on Jul 14. This actor downloaded some customers' information, which may have included their name, e-mail address, mailing address and phone number. However, banking and credit card information were not contained in the data that was accessed. The e-mail did not elaborate on how many individuals were affected. C&C is conducting an investigation and has lodged a police report. It has also alerted the Personal Data Protection Commission, as well as the customers whose data may have been compromised. It also urged its customers to remain vigilant of phishing or suspicious requests. BT has contacted C&C for further details, including the number of customers involved and whether the breach is limited to clients in Singapore. In the city-state, C&C is the agent for a number of automotive brands, including Mercedes-Benz, Kia, Citroen, Smart, Gogoro and Maxus. It is part of Singapore Exchange-listed Jardine Cycle & Carriage, which has a major automotive presence in the region, including Malaysia, Indonesia and Vietnam.