logo

ML Systems Integrator Pte Ltd

admin@mlsi.com.sg
+65 6850 7780

Uncategorized

  On October 16, 2019 Bob Diachenko and Vinny Troia discovered a wide-open Elasticsearch server containing an unprecedented 4 billion user accounts spanning more than 4 terabytes of data.   A total count of unique people across all data sets reached more than 1.2 billion people, making this one of the largest data leaks from a single source organization in history. The leaked data contained names, email addresses, phone numbers, LinkedIN...

Read More

A team of cybersecurity researchers has discovered a clever technique to remotely inject inaudible and invisible commands into voice-controlled devices — all just by shining a laser at the targeted device instead of using spoken words.   Dubbed 'Light Commands,' the hack relies on a vulnerability in MEMS microphones embedded in widely-used popular voice-controllable systems that unintentionally respond to light as if it were sound.   According to experiments...

Read More

  What do you do when your CEO emails you with an urgent request?   You immediately do what he says, of course.   This behaviour, however, is the exact reason why employees in Singapore are falling prey to CEO email scams that put the company’s data and funds at major risk. Among 11 Southeast Asian countries, Singapore recorded the highest number of business email compromise (BEC) scams last year, according...

Read More

  It's easy to get hacked. And yes, it can happen to you. Follow this advice from actual hackers, and you'll be a lot safer online.     1. Turn off your phone's Wi-Fi and Bluetooth     Hackers are religious about this. Keeping these features "on" all the time makes it easy for strangers to slip into your phone. The problem? If you keep Wi-Fi and Bluetooth active, hackers can see...

Read More

  Not everything on the dark web is illegal, but it is a huge marketplace for stolen data and personal information. After a data breach or hacking incident, personal information is often bought and sold on the dark web by identity thieves looking to make money off your good name—and any numbers or information associated with you.     What Information Is Most Common and How Much Is It...

Read More

Recent phishing campaigns have combined a clever use of fake voicemail, phony Microsoft email, and off-the-shelf phishing kits to target high-value victims.   Office 365 users are a constant target for phishers because their accounts can give access to high-value company data and systems. Hackers have now stepped up their game with new attacks that use audio files masquerading as voicemails to trick users into exposing their...

Read More

Humanity has come a long way from the times when the Internet became mainstream. Initially what began as a research project ARPANET (Advanced Research Projects Agency Network) funded by DARPA has grown aggressively and has single-handedly shaped human behavior.   When WWW (world wide web) came into existence, it was meant to share information over the Internet, from there part through natural evolution and part through webonomics...

Read More

In the recent months, there is a rise of telephone impersonation scams in Singapore.   One particular scam involves Singtel with callers claiming to be a Singtel technician or customer care officer, offering to troubleshoot customers' Internet connection. These callers ask for personal details including NRIC numbers, Wi-Fi passwords and router numbers.   "This is a scam," said the company. "Singtel does not ask for Wi-Fi passwords and router...

Read More

    Beware, Dear Windows Users!   The cybercriminal group behind BitPaymer and iEncrypt ransomware attacks has been found exploiting a zero-day vulnerability affecting a little-known component that comes bundled with Apple's iTunes and iCloud software for Windows to evade antivirus detection.   The vulnerable component in question is the Bonjour updater, a zero-configuration implementation of network communication protocol that works silently in the background and automates various low-level network tasks,...

Read More

        Before we start to panic, in all fairness, cybersecurity and its current state and almost every application contains security vulnerabilities. Some of which you may find today, but others would remain undiscovered until someone else finds ways and exploits them—which is inevitable.     Signal Private Messenger—promoted as one of the most secure messengers in the world isn't any exception.     Natalie Silvanovich, a Google Project Zero researcher, has discovered...

Read More