logo

ML Systems Integrator Pte Ltd

admin@mlsi.com.sg
+65 6850 7780

Author: MLSI

  Not everything on the dark web is illegal, but it is a huge marketplace for stolen data and personal information. After a data breach or hacking incident, personal information is often bought and sold on the dark web by identity thieves looking to make money off your good name—and any numbers or information associated with you.     What Information Is Most Common and How Much Is It...

Read More

Recent phishing campaigns have combined a clever use of fake voicemail, phony Microsoft email, and off-the-shelf phishing kits to target high-value victims.   Office 365 users are a constant target for phishers because their accounts can give access to high-value company data and systems. Hackers have now stepped up their game with new attacks that use audio files masquerading as voicemails to trick users into exposing their...

Read More

Humanity has come a long way from the times when the Internet became mainstream. Initially what began as a research project ARPANET (Advanced Research Projects Agency Network) funded by DARPA has grown aggressively and has single-handedly shaped human behavior.   When WWW (world wide web) came into existence, it was meant to share information over the Internet, from there part through natural evolution and part through webonomics...

Read More

In the recent months, there is a rise of telephone impersonation scams in Singapore.   One particular scam involves Singtel with callers claiming to be a Singtel technician or customer care officer, offering to troubleshoot customers' Internet connection. These callers ask for personal details including NRIC numbers, Wi-Fi passwords and router numbers.   "This is a scam," said the company. "Singtel does not ask for Wi-Fi passwords and router...

Read More

    Beware, Dear Windows Users!   The cybercriminal group behind BitPaymer and iEncrypt ransomware attacks has been found exploiting a zero-day vulnerability affecting a little-known component that comes bundled with Apple's iTunes and iCloud software for Windows to evade antivirus detection.   The vulnerable component in question is the Bonjour updater, a zero-configuration implementation of network communication protocol that works silently in the background and automates various low-level network tasks,...

Read More

        Before we start to panic, in all fairness, cybersecurity and its current state and almost every application contains security vulnerabilities. Some of which you may find today, but others would remain undiscovered until someone else finds ways and exploits them—which is inevitable.     Signal Private Messenger—promoted as one of the most secure messengers in the world isn't any exception.     Natalie Silvanovich, a Google Project Zero researcher, has discovered...

Read More

A web extension is a small software application that adds a capacity or functionality to a web browser. Web extensions are like a double-edged sword. Even though they make your online experience better and increase productivity, they also pose huge threats to both your privacy and security.   Being the most over-sighted weakest link in the browser security model, extensions sit between the browser application and the...

Read More

Are you an Apple user? Do you use third-party keyboard apps on your phone? If you do not already know, on iOS, third-party keyboard extensions can function fully on its own without access to other outside services and therefore, are not allowed to store what you type unless you grant “full access” permissions to enable some additional features through network access.   After the release of iOS...

Read More

  It was revealed that between November 2018 and May 2019, senior members of Tibetan groups received ill-intentioned links on WhatsApp by people posing as NGO workers, journalists and other fake personas. Among the victims that were targeted by the hackers include the Private Office of Tibetan Buddhist leader the Dalai Lama, the Central Tibetan Administration, the Tibetan Parliament, Tibetan human rights groups, and individuals holding...

Read More