logo

ML Systems Integrator Pte Ltd

admin@mlsi.com.sg
+65 6990 9055

    Urgent

    Uncategorized

      We distilled 30 independent reports dedicated to cybersecurity and cybercrime predictions for 2020 and compiled the top 5 most interesting findings and projections in this post. Compliance fatigue will spread among security professionals Being a source of ongoing controversy and debate, the California Consumer Privacy Act (CCPA) was finalized on 11th January 1, 2019.   Driven by laudable objectives to protect Californians' personal data, prevent its misuse...

    Read More

      You’re a smart business owner. You understand the importance of cybersecurity. You use a great email scanner and anti-virus program. You run regular security awareness training sessions with your employees. And you’ve enabled two-factor authentication. Basically, you’re doing everything right. Are you sure that you’re not missing something? What about your website? How well-protected is that? In this post, we’ll look at how cybercrime could kill your...

    Read More

      The software available for download on Monero’s (XMR) official website was compromised to steal cryptocurrency, according to a Nov. 19 Reddit post published by the coin’s core development team.   The command-line interface (CLI) tools available at getmonero.org may have been compromised over the last 24 hours. In the announcement, the team notes that the hash of the binaries available for download did not match the expected hashes.     The Software Was...

    Read More

      On October 16, 2019 Bob Diachenko and Vinny Troia discovered a wide-open Elasticsearch server containing an unprecedented 4 billion user accounts spanning more than 4 terabytes of data.   A total count of unique people across all data sets reached more than 1.2 billion people, making this one of the largest data leaks from a single source organization in history. The leaked data contained names, email addresses, phone numbers, LinkedIN...

    Read More

    A team of cybersecurity researchers has discovered a clever technique to remotely inject inaudible and invisible commands into voice-controlled devices — all just by shining a laser at the targeted device instead of using spoken words.   Dubbed 'Light Commands,' the hack relies on a vulnerability in MEMS microphones embedded in widely-used popular voice-controllable systems that unintentionally respond to light as if it were sound.   According to experiments...

    Read More

      What do you do when your CEO emails you with an urgent request?   You immediately do what he says, of course.   This behaviour, however, is the exact reason why employees in Singapore are falling prey to CEO email scams that put the company’s data and funds at major risk. Among 11 Southeast Asian countries, Singapore recorded the highest number of business email compromise (BEC) scams last year, according...

    Read More

      It's easy to get hacked. And yes, it can happen to you. Follow this advice from actual hackers, and you'll be a lot safer online.     1. Turn off your phone's Wi-Fi and Bluetooth     Hackers are religious about this. Keeping these features "on" all the time makes it easy for strangers to slip into your phone. The problem? If you keep Wi-Fi and Bluetooth active, hackers can see...

    Read More

      Not everything on the dark web is illegal, but it is a huge marketplace for stolen data and personal information. After a data breach or hacking incident, personal information is often bought and sold on the dark web by identity thieves looking to make money off your good name—and any numbers or information associated with you.     What Information Is Most Common and How Much Is It...

    Read More

    Recent phishing campaigns have combined a clever use of fake voicemail, phony Microsoft email, and off-the-shelf phishing kits to target high-value victims.   Office 365 users are a constant target for phishers because their accounts can give access to high-value company data and systems. Hackers have now stepped up their game with new attacks that use audio files masquerading as voicemails to trick users into exposing their...

    Read More

    Humanity has come a long way from the times when the Internet became mainstream. Initially what began as a research project ARPANET (Advanced Research Projects Agency Network) funded by DARPA has grown aggressively and has single-handedly shaped human behavior.   When WWW (world wide web) came into existence, it was meant to share information over the Internet, from there part through natural evolution and part through webonomics...

    Read More