logo

ML Systems Integrator Pte Ltd

admin@mlsi.com.sg
+65 6990 9055

    Urgent

    Uncategorized

    After a long wait and months of beta testing, Google last week finally released Android 11, the latest version of the Android mobile operating system—with features offering billions of its users more control over their data security and privacy.   Android security is always a hot topic and almost always for the wrong reason, including Google's failure to prevent malicious apps from being distributed through the Play...

    Read More

    Starting today, the lifespan of new TLS certificates will be limited to 398 days, a little over a year, from the previous maximum certificate lifetime of 27 months (825 days).   In a move that's meant to boost security, Apple, Google, and Mozilla are set to reject publicly rooted digital certificates in their respective web browsers that expire more than 13 months (or 398 days) from their...

    Read More

    Attention! If you use Amazon's voice assistant Alexa in you smart speakers, just opening an innocent-looking web-link could let attackers install hacking skills on it and spy on your activities remotely.   Check Point cybersecurity researchers—Dikla Barda, Roman Zaikin and Yaara Shriki—today disclosed severe security vulnerabilities in Amazon's Alexa virtual assistant that could render it vulnerable to a number of malicious attacks. According to a new report released by Check...

    Read More

    The ransom for the decryptor key in the WastedLocker attack could have topped $10 million, sources said.   Garmin, the GPS and aviation tech specialist, reportedly negotiated with Evil Corp for an decryption key to unlock its files in the wake of a WastedLocker ransomware attack.   The attack, which started on July 23, knocked out Garmin’s fitness-tracker services, customer-support outlets and commercial aviation offerings such as flight-plan filing,...

    Read More

      Microsoft is introducing a new Windows 10 Start menu design that will de-emphasize its Live Tiles. The software giant first hinted at the refreshed design earlier this year, and it’s arriving for Windows 10 testers today. “We are freshening up the Start menu with a more streamlined design that removes the solid color backplates behind the logos in the apps list and applies a uniform, partially transparent...

    Read More

      The 3-2-1 backup rule is a distinguished and glorified backup method. It appears that every backup vendor has endorsed it with at least one going so far as to call it “timeless.” Even the U.S Government advocated for the 3-2-1 backup; in a US-CERT paper (United States Computer Emergency Readiness Team), Carnegie Mellon recommended the 3-2-1 method.   In technology, mostly what at one point seeming “timeless” at the next moment...

    Read More

    Ragnar Locker is deploying Windows XP virtual machines to encrypt victim's files while evading detecting from security software installed on the host. It is the latest ransomware launched at the end of December 2019 targeting corporate networks in company-wide attacks, also well known for its attack on energy giant Energias de Portugal (EDP), where the attackers asked for a $10.9 million ransom after claiming to have...

    Read More

    Today, a Taiwanese security researcher published additional information on three vulnerabilities in the firmware of QNAP network-attached storage (NAS) devices.    Henry Huang, the security researcher, reported that the bugs reside in Photo Station, a photo album app that comes preinstalled with all recent versions of QNAP NAS systems.    He mentioned that the Photo Station app is installed on about 80% of all QNAP NAS systems. He believes, to be around 450,000 devices, in a rough estimate based on results generated by the Shodan IoT search engine. The...

    Read More

    For almost every account that you create online, you are required to make a secure password. Choosing one that's difficult for others to figure out requires the creation of unlikely letter and number combinations. Fortunately, crafting hard-to-crack and easy-to-remember passwords is pretty straightforward.     1st Method Applying Password Basics     Choose a password that no one will easily guess or hack   Don't use a word or phrase of special importance to you—like...

    Read More

      Looking to up your Zoom meeting game? Try setting up your Zoom backgrounds.   Here are the steps to set up a virtual background:   Step 1 : Download the virtual background images at https://bit.ly/34Plw1r   Step 2: In your Zoom, under your display picture on the top right then go to Settings   Step 3: Under Settings, click on Virtual Background and start adding the images, remember to uncheck the option “Mirror...

    Read More