BlackHat Asia recently hosts Singapore’s Deputy Chief Executive Brigadier General Gaurav Keerthi. Gaurav Keerthi was speaking on Singapore’s initiative for a voluntary “Cybersecurity Labelling Scheme” that is aimed at rating consumer’s broadband gateway. In his speech, Gaurav Keerthi draws parallel between the importance of public utility such as water supply & sewerage, focusing on the… Continue reading Singapore to propose Infosec tech rating – a review
If it’s one thing life has taught me, “almost” everything has a price. For a good sum, you can get a person to sell his phone. For others, something else. It’s known fact that we live in the world of data. Everything we do today generates data. Every step you take, every move you make… Continue reading Privacy – White elephant in the room with COVID-19?
Mad kudos to Toronto based Citizen Labs for this excellent work! Citizen Labs just published (about 13 hours ago) an expose of an Indian company, dubbed as ‘Dark Basin’ which is responsible for hacking thousands of individuals over six continents. The victim list isn’t just random joes, but public figures, rich and the affluent, NGOs… Continue reading Hackers for Hire – The case of Dark Basin
Introduction The Malay Mail reported that Sungai Buloh hospital (SBH) was recently hit with IT failures. Sg Buloh hospital is quite well known to the denizens of Klang Valley, being a governmental hospital of choice to many. I personally find the service is very good, doctors are friendly, professional and I don’t spend much time… Continue reading Sg Buloh hospital – Jan 2020 case study
Last updated: 4 September 2019 Acknowledgement The information provided in this post was through crowdsourcing, thanks to the IT Security SIG set up by Nigel Rodrigues, contributed by many, with candid discussion which inspired me to write this article. As this incident is still developing, this article will be updated with the latest information, and… Continue reading Malaysian Airport Incident – A case study
Where are we today? Almost on a daily basis, we are bombarded with news of cyber attacks, breaches, data leaks and more. It’s as if cyber related issues are becoming a norm, so much so someone was quoted saying “ There are 2 types of organization; the ones that has been breached, and the ones… Continue reading IT vs Cyber Security – Technology Debt
This thread started off as a discussion at the local Mamak (the Malaysian colloquial terminology for your cafe). A bunch of security and tech folks meet up to ponder upon the world and business woe. The discussion started off with the question “How do you decide on your tech purchase? What are your consideration factors?”… Continue reading Geopolitical considerations as part of Technology risk
In a recent expose published by SecureWorld through court documents seen, this issue has suddenly hit the spotlight. The damning question, can your employees be bought? Lets look at the reported news on the incident experienced by AT&T Wireless. The A&T& Wireless call center in Bothell, Washington is where this had begun. Call center employees… Continue reading Insider Threat – A look at AT&T incident
The incident Capital One issued a press release on 29 July 2019 that there was an unauthorized access by an outside individual who obtained access to it’s customer information. The information that was obtained were credit card application information, for applications between 2005 to early 2019. Information breached includes – Name – Addresses, ZIP/Postal Codes… Continue reading Capital One – The Breach
I woke up feeling very warm. I thought I missed the alarm, but its just 3:23 am. Very sure I don’t need a potty break, extremely sleepy and obviously upset. Leaned over to see the AC (air-condition), and I found that it was off. I’m very sure its too warm and by now the AC… Continue reading Do you need BCP for Cloud?