logo

ML Systems Integrator Pte Ltd

admin@mlsi.com.sg
+65 6850 7780

Uncategorized

  The impact of past breaches of government data would have been minimized - or the incidents even prevented - if data security measures announced yesterday had been in place, said Senior Minister Teo Chee Hean. These various data security incidents, like the cyber attack on SingHealth last year which saw the data of 1.5 million people stolen, had prompted the Government to set up the...

Read More

  SINGAPORE - A local software development company that works with schools here has been slapped with a $60,000 fine for failing to secure the personal information of nearly 48,000 students, parents and staff in 2016.   According to documents released on Thursday (Dec 5) by the Personal Data Protection Commission (PDPC), the company, which provides schools here with attendance-taking technology, had created vulnerabilities in a school's attendance system,...

Read More

  By the time a company tells you your data's been stolen as part of a breach, your login credentials may already be on the dark web. Here's how to keep pace with the hackers.   You often learn long after a breach that your personal data's been hacked, when Equifax, Yahoo, or some other company you've trusted with your information notifies you that your birthday, social security or credit-card number, health...

Read More

  Hackers don't typically tell their victims that they've been hacked. Most of the time, when hackers gain entry to computers to do their dirty work, they don't want anyone to know. That way, they can come back another time to see what else they can do or find.   Because of that, you might not know if your computer has already been hacked. But there are a...

Read More

  Email has long been a major weak link for security; the Democratic National Committee and Hillary Clinton's campaign were both infamously compromised by Russian hackers through email-related phishing attacks ahead of the 2016 US elections. With the 2020 campaign in full swing, a patched flaw in Microsoft Outlook is still giving attackers an opening.   First disclosed and fixed in October 2017, the bug is in a...

Read More

  We distilled 30 independent reports dedicated to cybersecurity and cybercrime predictions for 2020 and compiled the top 5 most interesting findings and projections in this post. Compliance fatigue will spread among security professionals Being a source of ongoing controversy and debate, the California Consumer Privacy Act (CCPA) was finalized on 11th January 1, 2019.   Driven by laudable objectives to protect Californians' personal data, prevent its misuse...

Read More

  You’re a smart business owner. You understand the importance of cybersecurity. You use a great email scanner and anti-virus program. You run regular security awareness training sessions with your employees. And you’ve enabled two-factor authentication. Basically, you’re doing everything right. Are you sure that you’re not missing something? What about your website? How well-protected is that? In this post, we’ll look at how cybercrime could kill your...

Read More

  The software available for download on Monero’s (XMR) official website was compromised to steal cryptocurrency, according to a Nov. 19 Reddit post published by the coin’s core development team.   The command-line interface (CLI) tools available at getmonero.org may have been compromised over the last 24 hours. In the announcement, the team notes that the hash of the binaries available for download did not match the expected hashes.     The Software Was...

Read More

  On October 16, 2019 Bob Diachenko and Vinny Troia discovered a wide-open Elasticsearch server containing an unprecedented 4 billion user accounts spanning more than 4 terabytes of data.   A total count of unique people across all data sets reached more than 1.2 billion people, making this one of the largest data leaks from a single source organization in history. The leaked data contained names, email addresses, phone numbers, LinkedIN...

Read More

A team of cybersecurity researchers has discovered a clever technique to remotely inject inaudible and invisible commands into voice-controlled devices — all just by shining a laser at the targeted device instead of using spoken words.   Dubbed 'Light Commands,' the hack relies on a vulnerability in MEMS microphones embedded in widely-used popular voice-controllable systems that unintentionally respond to light as if it were sound.   According to experiments...

Read More