Shellshock for Mac Users

Shellshock hit us last week. It’s a severe IT security vulnerability that threatens to affect most Unix type of operating systems. Now, Mac users, do you know that OS X is also a Unix based operating system? Well, if you didn’t, you just learned something, and you know that, OS X has also fallen prey to the same vulnerability. Well, fret not. Apple…

Continue reading →

HillV2 Gets Crowded

_DSC1791

This is about the fourth weekend of HillV2’s opening. Seeing the crowds throng the mall, even on weekday evenings, seems to say something. There is a tremendous pent-up demand for such a mall in this neighbourhood. It’s brand new, so perhaps it’s not unexpected that everyone wants to come check out the new place. There are so many F&B establishments in…

Continue reading →

Gathering Intel on SAF Personnel

_DSC1528

Last week we had M1 and K Box exposing personal data. Let’s up the ante a little. How about military data? Suppose you are the enemy, wanting to gather some intelligence on the Singapore Armed Forces (SAF). Say, for example, you want to get a name list of everyone who enlists into the SAF every year, and which unit of the SAF they enlist…

Continue reading →

6.4 TB of Cloud Storage My Way

_DSC1852

We use cloud based services for so many things these days. Storage, for example, is one of them. Popular names that come to mind include Dropbox, Google Drive and OneDrive. You probably use some or even all of them. I use them too, but I prefer to have my own private cloud storage. Are you like me? There are a couple of…

Continue reading →

K Box Victim or to Blame

Screen Shot 2014-09-17 at 10.00.56 pm #1

It’s easy to say that K Box is a victim in the matter of their membership database leak. No organisation wants such a thing to happen. But the question is, did K Box do their due diligence to secure their systems? Are they simply an innocent victim here? Or is this something they brought upon themselves? Security breaches such as this…

Continue reading →

K Box Nonchalant About Hack

K Box

K Box membership database was poured out on the Internet today by a hacker group calling themselves The Knowns. Leaked details of K Box 317K members included names, addresses, phone numbers, email addresses and NRIC numbers. The best part of this incident is, you know what, that K Box had “no comments”. According to Channel News Asia, the “no comments” was…

Continue reading →

Lessons in Cookie Management

_DSC1771

M1 had to suspend its iPhone 6 pre-orders last night because of the discovery of a security vulnerability in its pre-order system. The details shared by Channel News Asia (CNA) revealed that information of other customers could be leaked by trivially modifying a session cookie using a Google Chrome browser cookie plugin. It’s a silly amateurish mistake. Unfortunately, such mistakes are…

Continue reading →

HillV2 Opens

_DSC1504

HillV2 just opened its doors two weekends ago, on Saturday 6 September. That is, if just two tenants ready to receive their first customers count. There is Starbucks on the ground level, and Hillview Market Place (Cold Storage) on the second level. These two tenants were enough to draw a small crowd of residents from the neighbourhood. Developed by Far East Organisation,…

Continue reading →

Reviving the Apple Magic Mouse

_DSC1630

My Apple Magic Mouse stopped working this week. It was totally dead, even with a fresh set of known good batteries. I was sorely disappointed, for two important reasons. First, the Magic Mouse was a really great mouse, and I loved using it tremendously. Secondly, this is an Apple product, how could it break down so easily for no rhyme…

Continue reading →

SAF Needs To Embrace Smartphones Too

_DSC1436

I’ve read recently how the Defense Advanced Research Projects Agency (DARPA) of the United States are developing smartphones for their soldiers. Another article shares how smartphones can help save the lives of soldiers. It’s not surprising, isn’t it? Most of us have more sophisticated technology on us, throughout the entire day, than our soldiers typically do. Welcome to the age of smartphones….

Continue reading →