Top-secret report on SingHealth attack submitted to Minister-in-charge of Cyber Security, Singapore News – AsiaOne

Top-secret report on SingHealth attack submitted to Minister-in-charge of Cyber Security, Singapore News – AsiaOne

SINGAPORE – A top-secret report providing a thorough account of events that led to the cyber attack on SingHealth’s patient database has been submitted to Minister-in-charge of Cyber Security S. Iswaran. The report sums up and assesses all the evidence collected over 22 days of hearings from 37 witnesses, and offers recommendations on ways to […]

Penetration Testing & Vulnerability Scanning (Comparisons) – MK Cybersecurity Singapore – MK Cybersecurity Singapore

Penetration Testing & Vulnerability Scanning (Comparisons) – MK Cybersecurity Singapore – MK Cybersecurity Singapore

Is Penetration Testing and Vulnerability Scans The Same Thing? In the IT Security industry, technicians are prone to throwing around the phrases; Vulnerability Scans and Penetration Testing or Pen Test, and not realizing we might be confusing the public. So much so, we’ve made it far easier for any CEO or business owner to misunderstand […]

Penetration Testing & Vulnerability Scanning (Comparisons) – MK Cybersecurity Singapore – MK Cybersecurity Singapore

Penetration Testing & Vulnerability Scanning (Comparisons) – MK Cybersecurity Singapore – MK Cybersecurity Singapore

Is Penetration Testing and Vulnerability Scans The Same Thing? In the IT Security industry, technicians are prone to throwing around the phrases; Vulnerability Scans and Penetration Testing or Pen Test, and not realizing we might be confusing the public. So much so, we’ve made it far easier for any CEO or business owner to misunderstand […]

Converting Your Android Smartphone into Penetration Testing Device

Converting Your Android Smartphone into Penetration Testing Device

Post Views: 1 Big corporations trying to improve the user experience by making everything around simplify, increasing performance and connections with “IoT’s”. Today with the Android operating system installed on the most robust smartphones, we have their strengths and weaknesses. A Linux system, have their limitations and permissions. The user that makes the “Root” on […]

Top-secret report on SingHealth attack submitted to Minister-in-charge of Cyber Security, Singapore News – AsiaOne

Top-secret report on SingHealth attack submitted to Minister-in-charge of Cyber Security, Singapore News – AsiaOne

SINGAPORE – A top-secret report providing a thorough account of events that led to the cyber attack on SingHealth’s patient database has been submitted to Minister-in-charge of Cyber Security S. Iswaran. The report sums up and assesses all the evidence collected over 22 days of hearings from 37 witnesses, and offers recommendations on ways to […]

Penetration Testing & Vulnerability Scanning (Comparisons) – MK Cybersecurity Singapore – MK Cybersecurity Singapore

Penetration Testing & Vulnerability Scanning (Comparisons) – MK Cybersecurity Singapore – MK Cybersecurity Singapore

Is Penetration Testing and Vulnerability Scans The Same Thing? In the IT Security industry, technicians are prone to throwing around the phrases; Vulnerability Scans and Penetration Testing or Pen Test, and not realizing we might be confusing the public. So much so, we’ve made it far easier for any CEO or business owner to misunderstand […]

Penetration Testing & Vulnerability Scanning (Comparisons) – MK Cybersecurity Singapore – MK Cybersecurity Singapore

Penetration Testing & Vulnerability Scanning (Comparisons) – MK Cybersecurity Singapore – MK Cybersecurity Singapore

Is Penetration Testing and Vulnerability Scans The Same Thing? In the IT Security industry, technicians are prone to throwing around the phrases; Vulnerability Scans and Penetration Testing or Pen Test, and not realizing we might be confusing the public. So much so, we’ve made it far easier for any CEO or business owner to misunderstand […]