logo

ML Systems Integrator Pte Ltd

admin@mlsi.com.sg
+65 6990 9055

    Urgent

    Uncategorized

      Even if your fitness resolutions haven’t taken off (yet), there’s still time to make cyber resolutions for 2020.   Only a couple of weeks into the new year, and 2020 has already set the tone for cybersecurity, with political tensions making us painfully aware of the threat of cyber warfare, and looming threats highlighting the vulnerabilities of our vital infrastructure. As we enter 2020, it’s a good time...

    Read More

      Free parental control software can take some of the worry out of letting your children use the internet when you can't watch them directly.   Whether conducting research for a school project, keeping in touch with friends, or just enjoying what the web has to offer, you don’t want to have to worry about them stumbling across inappropriate content. In an ideal world, you would probably spend...

    Read More

    Microsoft made a commitment to provide 10 years of product support for Windows 7 when it was released on October 22, 2009. This 10-year period has now ended, and Microsoft has discontinued Windows 7 support so that we can focus our investment on supporting newer technologies and great new experiences. The specific end of support day for Windows 7 was January 14, 2020. Technical assistance and...

    Read More

    For the better part of 2019, TikTok contained vulnerabilities that could have enabled hackers to access users’ personal information, payment details and private videos.   The flaws were detailed today by a group of researchers from cybersecurity provider Check Point Software Technologies Ltd. The company previously reported the issue to TikTok’s creator, China-based ByteDance Ltd., in November and waited for a fix to be rolled out before...

    Read More

      A newly detected form of ransomware is not only targeting networks but in the case of a successful infection also encrypts all connected devices.   “Snake” ransomware was first detected by security researchers at MalwareHunterTeam last week and detailed by “ethical hacker” Vitali Kremez to reverse-engineer it. Kremez describes Snake as containing a higher level of obfuscation than is typical of previous forms of ransomware.   Snake removes a targeted computer’s Shadow Volume...

    Read More

      Time and again, the cybersecurity community keeps warning users about basic security practices. Yet, the criminals still succeed in targeting a large number of people almost every day due to some common blunders.   Nowadays it has become important for every internet user to avoid cybersecurity mistakes that happen routinely. Common Cybersecurity Mistakes To Avoid Below we list some common yet dangerous cybersecurity mistakes that everyone should...

    Read More

      The web crawlers and scanners mostly concentrate on HTML and JavaScript files and often ignore media files. Threat actors are particularly using WebSockets to provide a more covert way to exchange data than typical HTTP request-responses.   Steganography has long been used by malware authors to hide malicious data within legitimate-looking images and currently, it is being used by cybercriminals to spread credit card skimmers.     What is...

    Read More

    Internet-connected devices have been one of the most remarkable developments that have happened to humankind in the last decade. Although this development is a good thing, it also stipulates a high security and privacy risk to personal information.   In one such recent privacy mishap, smart IP cameras manufactured by Chinese smartphone maker Xiaomi found mistakenly sharing surveillance footage of Xiaomi users with other random users without...

    Read More