logo

ML Systems Integrator Pte Ltd

admin@mlsi.com.sg
+65 6850 7780

Author: MLSI

In the recent months, there is a rise of telephone impersonation scams in Singapore.   One particular scam involves Singtel with callers claiming to be a Singtel technician or customer care officer, offering to troubleshoot customers' Internet connection. These callers ask for personal details including NRIC numbers, Wi-Fi passwords and router numbers.   "This is a scam," said the company. "Singtel does not ask for Wi-Fi passwords and router...

Read More

    Beware, Dear Windows Users!   The cybercriminal group behind BitPaymer and iEncrypt ransomware attacks has been found exploiting a zero-day vulnerability affecting a little-known component that comes bundled with Apple's iTunes and iCloud software for Windows to evade antivirus detection.   The vulnerable component in question is the Bonjour updater, a zero-configuration implementation of network communication protocol that works silently in the background and automates various low-level network tasks,...

Read More

        Before we start to panic, in all fairness, cybersecurity and its current state and almost every application contains security vulnerabilities. Some of which you may find today, but others would remain undiscovered until someone else finds ways and exploits them—which is inevitable.     Signal Private Messenger—promoted as one of the most secure messengers in the world isn't any exception.     Natalie Silvanovich, a Google Project Zero researcher, has discovered...

Read More

A web extension is a small software application that adds a capacity or functionality to a web browser. Web extensions are like a double-edged sword. Even though they make your online experience better and increase productivity, they also pose huge threats to both your privacy and security.   Being the most over-sighted weakest link in the browser security model, extensions sit between the browser application and the...

Read More

Are you an Apple user? Do you use third-party keyboard apps on your phone? If you do not already know, on iOS, third-party keyboard extensions can function fully on its own without access to other outside services and therefore, are not allowed to store what you type unless you grant “full access” permissions to enable some additional features through network access.   After the release of iOS...

Read More

  It was revealed that between November 2018 and May 2019, senior members of Tibetan groups received ill-intentioned links on WhatsApp by people posing as NGO workers, journalists and other fake personas. Among the victims that were targeted by the hackers include the Private Office of Tibetan Buddhist leader the Dalai Lama, the Central Tibetan Administration, the Tibetan Parliament, Tibetan human rights groups, and individuals holding...

Read More

  An urgent and important software update was released by Google for their Chrome web browser and it is crucial that all users upgrade to the latest available version as soon as possible.   The new version - Chrome 77.0.3865.90, is available to users worldwide from Wednesday and it contains security patches for 1 critical and 3 high-risk security vulnerabilities. The most severe could allow remote hackers to...

Read More

The world of connected consumer electronics, IoT, and smart devices is growing faster than ever with tens of billions of connected devices streaming and sharing data wirelessly over the Internet. It is fast. It is efficient. But is it secure? As we connect everything from coffee maker to front-door locks and cars to the Internet, we are sacrificing security for efficiency and creating more potential—and...

Read More

Before making your calendar public, a security warning would have popped out – “Making your calendar public will make all events visible to the world, including via Google search. Are you sure?”   If you have ever shared your Google Calendars publicly in the past which should not be publicly accessible now, you ought to check your Google settings and ensure that you are not exposing all...

Read More