logo

ML Systems Integrator Pte Ltd

admin@mlsi.com.sg
+65 6850 7780

Uncategorized

    Cybersecurity researchers today disclosed details of security vulnerabilities found in popular antivirus solutions that could enable attackers to elevate their privileges, thereby helping malware sustain its foothold on the compromised systems.   According to a report published by CyberArk Labs today and shared with The Hacker News, the high privileges often associated with anti-malware products render them more vulnerable to exploitation via file manipulation attacks, resulting in...

Read More

Your computer is not how you left it. You have your suspicions, but how can you tell if someone was snooping on your PC? You can take precautions against others using your PC, but sometimes, you don't think it's necessary. You can trust your family and friends. And the people you work with won't snoop on your online activities.     Yet things aren't right. Your laptop isn't where...

Read More

After a long wait and months of beta testing, Google last week finally released Android 11, the latest version of the Android mobile operating system—with features offering billions of its users more control over their data security and privacy.   Android security is always a hot topic and almost always for the wrong reason, including Google's failure to prevent malicious apps from being distributed through the Play...

Read More

Starting today, the lifespan of new TLS certificates will be limited to 398 days, a little over a year, from the previous maximum certificate lifetime of 27 months (825 days).   In a move that's meant to boost security, Apple, Google, and Mozilla are set to reject publicly rooted digital certificates in their respective web browsers that expire more than 13 months (or 398 days) from their...

Read More

Attention! If you use Amazon's voice assistant Alexa in you smart speakers, just opening an innocent-looking web-link could let attackers install hacking skills on it and spy on your activities remotely.   Check Point cybersecurity researchers—Dikla Barda, Roman Zaikin and Yaara Shriki—today disclosed severe security vulnerabilities in Amazon's Alexa virtual assistant that could render it vulnerable to a number of malicious attacks. According to a new report released by Check...

Read More

The ransom for the decryptor key in the WastedLocker attack could have topped $10 million, sources said.   Garmin, the GPS and aviation tech specialist, reportedly negotiated with Evil Corp for an decryption key to unlock its files in the wake of a WastedLocker ransomware attack.   The attack, which started on July 23, knocked out Garmin’s fitness-tracker services, customer-support outlets and commercial aviation offerings such as flight-plan filing,...

Read More

  Microsoft is introducing a new Windows 10 Start menu design that will de-emphasize its Live Tiles. The software giant first hinted at the refreshed design earlier this year, and it’s arriving for Windows 10 testers today. “We are freshening up the Start menu with a more streamlined design that removes the solid color backplates behind the logos in the apps list and applies a uniform, partially transparent...

Read More

  The 3-2-1 backup rule is a distinguished and glorified backup method. It appears that every backup vendor has endorsed it with at least one going so far as to call it “timeless.” Even the U.S Government advocated for the 3-2-1 backup; in a US-CERT paper (United States Computer Emergency Readiness Team), Carnegie Mellon recommended the 3-2-1 method.   In technology, mostly what at one point seeming “timeless” at the next moment...

Read More

Ragnar Locker is deploying Windows XP virtual machines to encrypt victim's files while evading detecting from security software installed on the host. It is the latest ransomware launched at the end of December 2019 targeting corporate networks in company-wide attacks, also well known for its attack on energy giant Energias de Portugal (EDP), where the attackers asked for a $10.9 million ransom after claiming to have...

Read More

Today, a Taiwanese security researcher published additional information on three vulnerabilities in the firmware of QNAP network-attached storage (NAS) devices.    Henry Huang, the security researcher, reported that the bugs reside in Photo Station, a photo album app that comes preinstalled with all recent versions of QNAP NAS systems.    He mentioned that the Photo Station app is installed on about 80% of all QNAP NAS systems. He believes, to be around 450,000 devices, in a rough estimate based on results generated by the Shodan IoT search engine. The...

Read More