logo

ML Systems Integrator Pte Ltd

admin@mlsi.com.sg
+65 6850 7780

November 2019

  The software available for download on Monero’s (XMR) official website was compromised to steal cryptocurrency, according to a Nov. 19 Reddit post published by the coin’s core development team.   The command-line interface (CLI) tools available at getmonero.org may have been compromised over the last 24 hours. In the announcement, the team notes that the hash of the binaries available for download did not match the expected hashes.     The Software Was...

Read More

  On October 16, 2019 Bob Diachenko and Vinny Troia discovered a wide-open Elasticsearch server containing an unprecedented 4 billion user accounts spanning more than 4 terabytes of data.   A total count of unique people across all data sets reached more than 1.2 billion people, making this one of the largest data leaks from a single source organization in history. The leaked data contained names, email addresses, phone numbers, LinkedIN...

Read More

A team of cybersecurity researchers has discovered a clever technique to remotely inject inaudible and invisible commands into voice-controlled devices — all just by shining a laser at the targeted device instead of using spoken words.   Dubbed 'Light Commands,' the hack relies on a vulnerability in MEMS microphones embedded in widely-used popular voice-controllable systems that unintentionally respond to light as if it were sound.   According to experiments...

Read More

  What do you do when your CEO emails you with an urgent request?   You immediately do what he says, of course.   This behaviour, however, is the exact reason why employees in Singapore are falling prey to CEO email scams that put the company’s data and funds at major risk. Among 11 Southeast Asian countries, Singapore recorded the highest number of business email compromise (BEC) scams last year, according...

Read More

  It's easy to get hacked. And yes, it can happen to you. Follow this advice from actual hackers, and you'll be a lot safer online.     1. Turn off your phone's Wi-Fi and Bluetooth     Hackers are religious about this. Keeping these features "on" all the time makes it easy for strangers to slip into your phone. The problem? If you keep Wi-Fi and Bluetooth active, hackers can see...

Read More

  Not everything on the dark web is illegal, but it is a huge marketplace for stolen data and personal information. After a data breach or hacking incident, personal information is often bought and sold on the dark web by identity thieves looking to make money off your good name—and any numbers or information associated with you.     What Information Is Most Common and How Much Is It...

Read More

Recent phishing campaigns have combined a clever use of fake voicemail, phony Microsoft email, and off-the-shelf phishing kits to target high-value victims.   Office 365 users are a constant target for phishers because their accounts can give access to high-value company data and systems. Hackers have now stepped up their game with new attacks that use audio files masquerading as voicemails to trick users into exposing their...

Read More

Humanity has come a long way from the times when the Internet became mainstream. Initially what began as a research project ARPANET (Advanced Research Projects Agency Network) funded by DARPA has grown aggressively and has single-handedly shaped human behavior.   When WWW (world wide web) came into existence, it was meant to share information over the Internet, from there part through natural evolution and part through webonomics...

Read More