logo

ML Systems Integrator Pte Ltd

admin@mlsi.com.sg
+65 6850 7780

 

News

Tips & Articles About IT

  Free parental control software can take some of the worry out of letting your children use the internet when you can't watch them directly.   Whether conducting research for a school project, keeping in touch with friends, or just enjoying what the web has to offer, you don’t want to have to worry about them stumbling across inappropriate content. In an ideal world, you would probably spend...

Read More

Microsoft made a commitment to provide 10 years of product support for Windows 7 when it was released on October 22, 2009. This 10-year period has now ended, and Microsoft has discontinued Windows 7 support so that we can focus our investment on supporting newer technologies and great new experiences. The specific end of support day for Windows 7 was January 14, 2020. Technical assistance and...

Read More

For the better part of 2019, TikTok contained vulnerabilities that could have enabled hackers to access users’ personal information, payment details and private videos.   The flaws were detailed today by a group of researchers from cybersecurity provider Check Point Software Technologies Ltd. The company previously reported the issue to TikTok’s creator, China-based ByteDance Ltd., in November and waited for a fix to be rolled out before...

Read More

  A newly detected form of ransomware is not only targeting networks but in the case of a successful infection also encrypts all connected devices.   “Snake” ransomware was first detected by security researchers at MalwareHunterTeam last week and detailed by “ethical hacker” Vitali Kremez to reverse-engineer it. Kremez describes Snake as containing a higher level of obfuscation than is typical of previous forms of ransomware.   Snake removes a targeted computer’s Shadow Volume...

Read More

  Time and again, the cybersecurity community keeps warning users about basic security practices. Yet, the criminals still succeed in targeting a large number of people almost every day due to some common blunders.   Nowadays it has become important for every internet user to avoid cybersecurity mistakes that happen routinely. Common Cybersecurity Mistakes To Avoid Below we list some common yet dangerous cybersecurity mistakes that everyone should...

Read More

  The web crawlers and scanners mostly concentrate on HTML and JavaScript files and often ignore media files. Threat actors are particularly using WebSockets to provide a more covert way to exchange data than typical HTTP request-responses.   Steganography has long been used by malware authors to hide malicious data within legitimate-looking images and currently, it is being used by cybercriminals to spread credit card skimmers.     What is...

Read More