| Technology
|
A trending news topic right now is about the possible hack of celebrity iCloud accounts. This brings me to one of my pet topics. How much of the cloud should you (and me) trust? You see, there are many great benefits with using ...
| Technology
|
The second person involved in the purported hacking of the Istana website has been convicted. As you recall, this hack involved a Cross-Site Scripting attack (XSS) on the Istana website. Two persons were charged. The other was ...
| Technology
|
No IT system is perfectly secure. It’s not about if you get compromised or hacked, but when. You still need to do a great job securing your IT systems, but equally important these days is having a great recovery plan in ...
| Miscellaneous
|
After slamming the NDP website, I feel I owe an explanation. Particularly about the security scare. You see, when I write for casual reading, many of the finer details are glossed over. In all the excitement, it’s easy to ...
| Technology
|
Nowadays, it’s usually not a question of if, but when. Every organisation, every website, they will all eventually find their IT security compromised one way or another. This time it is Kickstarter. In a message to all it ...
| Technology
|
One of the highlights of the recently launched iPhone 5S is its fingerprint sensor, aka Touch ID. The Android world also has the HTC One Max with a fingerprint sensor on its back. Now, if you fancy this new security feature, but ...
| Technology
|
It is not just malware that you need to worry about when you use your computer. New threats, such as online phishing and physical computer theft, are fast becoming top concerns of many users. Many antivirus point products have ...
| Technology
|
I’m finally heeding my own advice. For many years, I’ve been doing without any sort of anti-virus software, not even free ones. Earlier this year, I planned to change that, and started to consider several solutions. ...
| Technology
|
I’m always amused to read IT security guides such as this. Not that they are useless or incorrect, but they give readers the false sense of security that, after they’re done reading cover to cover, they’ve ...
| Technology
|
Assurity Trusted Solutions, a wholly-owned subsidiary of the Infocomm Development Authority of Singapore (IDA), recently shared findings from their survey on Cyber Security and 2FA Awareness. You may recall some snippets of ...