| Technology
|
At work, yesterday, we were clearing out some stores from various secret network locations, and something unusual caught my eye. A picture of raspberries. Among the stacks of various boring manuals, disclaimer sheets, warranty ...
| Technology
|
I’ve been sitting on this information for some time, waiting to get more research done before I publish a post. But since word has come out about how Lenovo preloads what amounts to very bad spyware on their PCs, I thought ...
| Technology
|
It’s still relatively early in this new year of 2015, and if you’ve not thought about any new year’s resolution, I’ve some suggestions for you. If you’re not already doing these things, it’s ...
| Technology
|
I was at GovWare 2014 last week, an annual conference and exhibition on cyber security ecosystem. IT security conferences like this one have the tendency to send you away sad. It’s not so much I learn something new, but ...
| Technology
|
Shellshock hit us last week. It’s a severe IT security vulnerability that threatens to affect most Unix type of operating systems. Now, Mac users, do you know that OS X is also a Unix based operating system? Well, if you ...
| Miscellaneous
|
Last week we had M1 and K Box exposing personal data. Let’s up the ante a little. How about military data? Suppose you are the enemy, wanting to gather some intelligence on the Singapore Armed Forces (SAF). Say, for ...
| Miscellaneous
|
It’s easy to say that K Box is a victim in the matter of their membership database leak. No organisation wants such a thing to happen. But the question is, did K Box do their due diligence to secure their systems? Are they ...
| Technology
|
K Box membership database was poured out on the Internet today by a hacker group calling themselves The Knowns. Leaked details of K Box 317K members included names, addresses, phone numbers, email addresses and NRIC numbers. The ...
| Technology
|
M1 had to suspend its iPhone 6 pre-orders last night because of the discovery of a security vulnerability in its pre-order system. The details shared by Channel News Asia (CNA) revealed that information of other customers could ...
| Technology
|
Most people will know a little bit about IT security, and probably the importance of awareness to protect themselves. IT security, unfortunately, is a complicated business. Even sometimes when people think they know about, say, ...