logo

ML Systems Integrator Pte Ltd

admin@mlsi.com.sg
+65 6850 7780

Uncategorized

SINGAPORE: Personal information from 1.1 million RedMart accounts was stolen from e-commerce platform Lazada and sold online in a data breach.   A Lazada spokesperson confirmed this on Friday (Oct 30).   CNA had earlier come across an online forum which was purportedly selling personal data from various e-commerce sites around the world, including Lazada.   The site claimed to have information like names, phone numbers and partial credit card numbers...

Read More

  Attention readers, if you are using Google Chrome browser on your Windows, Mac, or Linux computers, you need to update your web browsing software immediately to the latest version Google released earlier today.     Google released Chrome version 86.0.4240.111 today to patch several security high-severity issues, including a zero-day vulnerability that has been exploited in the wild by attackers to hijack targeted computers.     Tracked as CVE-2020-15999, the actively...

Read More

    Cybersecurity researchers today disclosed details of security vulnerabilities found in popular antivirus solutions that could enable attackers to elevate their privileges, thereby helping malware sustain its foothold on the compromised systems.   According to a report published by CyberArk Labs today and shared with The Hacker News, the high privileges often associated with anti-malware products render them more vulnerable to exploitation via file manipulation attacks, resulting in...

Read More

Your computer is not how you left it. You have your suspicions, but how can you tell if someone was snooping on your PC? You can take precautions against others using your PC, but sometimes, you don't think it's necessary. You can trust your family and friends. And the people you work with won't snoop on your online activities.     Yet things aren't right. Your laptop isn't where...

Read More

After a long wait and months of beta testing, Google last week finally released Android 11, the latest version of the Android mobile operating system—with features offering billions of its users more control over their data security and privacy.   Android security is always a hot topic and almost always for the wrong reason, including Google's failure to prevent malicious apps from being distributed through the Play...

Read More

Starting today, the lifespan of new TLS certificates will be limited to 398 days, a little over a year, from the previous maximum certificate lifetime of 27 months (825 days).   In a move that's meant to boost security, Apple, Google, and Mozilla are set to reject publicly rooted digital certificates in their respective web browsers that expire more than 13 months (or 398 days) from their...

Read More

Attention! If you use Amazon's voice assistant Alexa in you smart speakers, just opening an innocent-looking web-link could let attackers install hacking skills on it and spy on your activities remotely.   Check Point cybersecurity researchers—Dikla Barda, Roman Zaikin and Yaara Shriki—today disclosed severe security vulnerabilities in Amazon's Alexa virtual assistant that could render it vulnerable to a number of malicious attacks. According to a new report released by Check...

Read More

The ransom for the decryptor key in the WastedLocker attack could have topped $10 million, sources said.   Garmin, the GPS and aviation tech specialist, reportedly negotiated with Evil Corp for an decryption key to unlock its files in the wake of a WastedLocker ransomware attack.   The attack, which started on July 23, knocked out Garmin’s fitness-tracker services, customer-support outlets and commercial aviation offerings such as flight-plan filing,...

Read More

  Microsoft is introducing a new Windows 10 Start menu design that will de-emphasize its Live Tiles. The software giant first hinted at the refreshed design earlier this year, and it’s arriving for Windows 10 testers today. “We are freshening up the Start menu with a more streamlined design that removes the solid color backplates behind the logos in the apps list and applies a uniform, partially transparent...

Read More

  The 3-2-1 backup rule is a distinguished and glorified backup method. It appears that every backup vendor has endorsed it with at least one going so far as to call it “timeless.” Even the U.S Government advocated for the 3-2-1 backup; in a US-CERT paper (United States Computer Emergency Readiness Team), Carnegie Mellon recommended the 3-2-1 method.   In technology, mostly what at one point seeming “timeless” at the next moment...

Read More