Jump to content

Search the Community

Showing results for tags 'security'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Cars
    • General Car Discussion
    • Tips and Resources
  • Aftermarket
    • Accessories
    • Performance and Tuning
    • Cosmetics
    • Maintenance & Repairs
    • Detailing
    • Tyres and Rims
    • In-Car-Entertainment
  • Car Brands
    • Japanese Talk
    • Conti Talk
    • Korean Talk
    • American Talk
    • Malaysian Talk
    • China Talk
  • General
    • Motorsports
    • Meetups
    • Complaints
  • Sponsors
    • Products & Services
  • Non-Car Related
    • Lite & EZ
    • Makan Corner
    • Travel & Road Trips
    • Football Channel
    • Hobbies
    • Healthcare & Wellness
    • Property Buzz
    • Investment & Financial Matters
  • MCF Forum Related
    • Official Announcements
    • Feedback & Suggestions
    • FAQ & Help
    • Testing

Blogs

  • MyAutoBlog

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Found 72 results

  1. https://www.straitstimes.com/singapore/singapore-and-india-discuss-plans-on-the-use-of-the-chandipur-live-firing-range-in-india Looks like the Boys going to have fun time in India instead of Australia or NZ for army exercise in future. Wonder why not S Korea or Taiwan or NZ? ****** SINGAPORE - It is impossible to conduct live firing of missiles like the Spyder ground-based air defence system in Singapore because of the country's limited size. But it may be able to do so at the Chandipur Integrated Test Range in India in the future, if a new defence technology cooperation agreement between the two countries come to fruition. On Wednesday (Nov 20), Defence Minister Ng Eng Hen and his Indian counterpart, Rajnath Singh, witnessed the exchange of a letter of intent on the issue. At the end of the 4th India-Singapore Defence Ministers' Dialogue held at the Ministry of Defence, both sides also agreed that the Singapore-India-Thailand maritime exercise, held for the first time in the Andaman Sea in September, should be held annually from next year. Speaking to reporters after the meeting, Dr Ng said that defence ties between India and Singapore had grown from strength to strength since 2015 when the revised Defence Cooperation Agreement, which established the dialogue between the defence ministers, was signed. In turn, Mr Singh said: "From our discussions today, I am confident that we will enter in a new era of defence partnership in composing both bilateral defence cooperation and defence industry cooperation." He said that submarine rescue and humanitarian aid and disaster relief emerged as new areas of cooperation which both sides have agreed to pursue. He added that the discussions were "fruitful, cordial, frank and very detailed". The Indian minister, who was appointed in May, is on a three-day introductory visit to Singapore from Monday (Nov 18). He called on Deputy Prime Minister Heng Swee Keat on Tuesday and also visited Singapore Armed Forces (SAF) units. Asked about the the Chandipur facility , Dr Ng said that it would be impossible to fire missiles like the Spyder ground-based air defence systems in Singapore as it is a small country. Related Story Singapore a major economic partner in Modi's second term, says Indian minister "So we're very thankful to India for providing that facility. India is a large country with a large land mass, and we understand also that this is a significant gesture on their part. We want to use the facility very productively." On the trilateral exercise, Dr Ng said it offered benefits at various levels. At the navy-to-navy level, confidence and interoperability could be built up and tactics as well as protocols shared. It also sent an important signal that the Andaman Seas and the Malacca Straits are international straits which commercial and military ships pass through, said Dr Ng. "It gives confidence to our own militaries as we exercise our duties, as well as to the international shipping communities in other countries who use these vital waterways," he said. Responding to the same question on the maritime exercise, Mr Singh said that India is seeking to further enhance its participation and engagements in the Indo Pacific which is an important region for his country. A joint statement by the two defence ministers after the meeting said that the exercise underscored the shared responsibility of the countries to work together to keep sea lines of communications open, and strengthens interoperability between the three countries. Another letter of intent was exchanged on Wednesday reaffirming a mutual commitment to explore deepening humanitarian assistance and disaster relief cooperation in areas such as information sharing and capacity building. The joint statement said Mr Singh also offered the setting up of joint test facilities under the Defence Testing Infrastructure Scheme of India, and Dr Ng agreed to explore opportunities for joint collaboration. They also agreed to explore cooperation in areas such as artificial intelligence, geo-spatial data sharing, and cyber security. Dr Ng expressed appreciation for India's continued support of the SAF's training in India, while Mr Singh reaffirmed India's support and participation in the regional security architecture, namely the Asean Defence Ministers' Meeting-Plus and its initiatives, added the statement. A separate statement from Mindef said that both ministers reaffirmed the strong and long-standing bilateral defence relationship and discussed ways to strengthen defence cooperation. They also discussed regional security developments and reaffirmed the good progress made in cooperation across the three services on defence technology and in multilateral engagements. The first India-Singapore Defence Ministers' Dialogue was held in Singapore in 2016. An annual affair, the next one will be held in India. As part of Mr Singh's introductory visit, he went aboard stealth frigate RSS Stalwart at RSS Singapura-Changi Naval Base. He was also hosted to a familiarisation ride on the Republic of Singapore Air Force's Super Puma helicopter at Sembawang Air Base.
  2. Volvobrick

    Ang Moh whacked local Security Uncle

    https://www.facebook.com/1993145654159487/posts/2912589585548418?sfns=mo Another case of imported bullies Let's see if this guy get fired from his job.
  3. Those who frequent, looking to buy, rent, live or stay in private apartments or condos, what do you expect? What is "24 Hour Security". Got number to call in case of emergency and help endeavours to arrive within 15 mins considered? Having as many CCTVs as units yet no known policy, procedures and management known? When requests made, response is only for alleged criminal acts? Is the phrase too loosely defined that agents may wantonly use to attract viewing? In this time and age, in Singapore, with managing agent and cleaning staff on site, are security guards needed? >
  4. Hi all, I am rather concerned that there’s no effort to protect our login. Currently. Whatever we type seems to be sent in clear and it will be quite easy to obtain both our user name and password. I am suggesting MCF at least implements a verified SSL certificate so we have https running.
  5. Jusnel

    Help on Huawei Nova i30

    i got problem with my nova i30 tried updating the security update on my hp. halfway hp says failed, i'm forced to recover, or do factory reset (clear all data) I tried to recover, but not successful. Next option is to do factory reset. I got alot of data and photos that i need. Anyone can help or recommend someone i can go to? :(
  6. Hi guys, am planning to attend some courses while clearing my leaves from work next month. one of the few i planning to take is security courses. i think this is one of the few trades in our current market that is in high demanding for standard and manpower and of course recession proof. Anyone here can share how the procedure works? where should i register myself for the courses? thanks in advance!
  7. after US ...now Malaysia … The leaders of Thailand and Malaysia agreed on Friday to boost security cooperation and consider building a border wall to combat transnational crime and smuggling, an idea that appears to be gaining popularity elsewhere in the world. People-trafficking and the smuggling of contraband, including drugs and petrol, have flourished along the Thai-Malay border for years until a crackdown by Thai officials on human traffickers caused some of the routes to shut down last year. Analysts say separatist insurgents operating in Thailand’s deep south use Malaysia as a base to launch and plan their attacks. Malaysian Prime Minister Najib Razak told reporters that security remained “a very important matter” for both countries and there was an agreement to step up intelligence gathering and sharing to rein in cross-border terrorism. “We both face security issues including the fight against terrorism, human trafficking and illegal smuggling, that is why we need to address these issues seriously,” said Thai Prime Minister Prayuth Chan-ocha. Najib said both sides had discussed the construction and extension of a border wall but details remained to be worked out.
  8. https://www.straitstimes.com/singapore/harsher-punishment-for-security-officers-who-sleep-on-the-job-or-act-unprofessionally-from SINGAPORE - Private security officers who slack off, sleep on the job or come to work drunk can face tougher punishment from next year, as the police strengthen penalties for errant behaviour to boost the industry's professionalism and bolster Singapore's defences. From Jan 1, officers who display errant behaviour can be punished by a fine not exceeding $2,000 or imprisonment for a term not exceeding three months, or both, The Straits Times has learnt. ***** Would it not applied to the SMRT to "cure" the deep-seated cultural extraction? Have become so intolerant of the security or has the security becoming so blatant that this has become law?
  9. SINGAPORE: Commuters may soon be required to put their belongings through an X-ray scanner and walk through a metal detector before entering fare gates at MRT stations. This is part of enhanced security screening being tested at several stations, the Land Transport Authority (LTA) said on Monday (Nov 5). The trial will begin on Nov 12. LTA said the data from the trial will enable it to "streamline and optimise its security screening processes, and reduce the future impact on daily rail operations". "We will also collect feedback from commuters and public transport operators to improve the effectiveness of future security operations and emergency exercises." LTA chief executive Ngien Hoon Ping said the authority will continue to enhance its security measures to ensure that the transport system remained safe and secure for all commuters. "By the end of this year, public transport operators will also progressively introduce the use of handheld metal detectors in their security checks at bus interchanges and MRT stations," he added https://www.channelnewsasia.com/news/singapore/commuters-to-undergo-security-screening-at-mrt-stations-as-part-10898938
  10. Ash2017

    IP Home Surveillance Camera

    Paging IT Experts for advice and recommendations Looking for IP camera with the following features 1. wireless 2. 1080p 3. motion detection and push notification 4. night vision 5. two way talk 6. any other feature experts here feels worthwhile mentioning 7. Value for money Thank you
  11. JUST IN: HardwareZone Forum hit by security breach, 685,000 registered user profiles affected, police report lodged Here is the statement from SPH Magazines, which owns the HardwareZone Forum site, in full: "Arising from a suspicious posting on HardwareZone (HWZ) Forum website on 18 February, an investigation was immediately launched to ascertain whether a security breach on the HardwareZone (HWZ) Forum site occurred. The investigation found that: A Senior Moderator’s account had been compromised by an unidentified hacker and used to view approximately 685,000 registered user profiles since September 2017. The hacker used the compromised credentials to impersonate the Senior Moderator to retrieve user profile data which comprised name, email address and user ID, and possible optional data fields. The HWZ database does not contain NRIC numbers, telephone numbers and addresses as these were purged in line with the Personal Data Protection Commission (PDPC) Guidelines in July 2015. As a matter of precaution, forum users were advised to change their forum account password. SPH Magazines, which owns the HWZ site, has also engaged security consultants to conduct a thorough review of the system. A police report has been lodged and PDPC has been informed. SPH Magazines and HWZ sincerely apologise to HWZ users for this breach of security. We remain committed to protecting all personal data shared with us." http://www.straitstimes.com/singapore/st-now-news-as-it-happens-feb-20-2018 MCF got tio bo? Also under SPH, right?
  12. I am one of the unfortunate car that have both side mirrors and assembly (left & right) stolen. It happened yesterday 21 Nov 2012, parked at zone 2 area when I returned to my car approximately 6.30pm Car make & model - Honda Civic 2L (FD2). My observation on the carpark surroundings definitely a easy target for theft. Please think twice if you're driving to Legoland.
  13. Not sure if wols, happened yesterday in USJ One condo. The 'fighter' started to get aggressive when refused entry into the condo. Made the first move, in the end, kena taken down by the small-built guard.
  14. Sci10213

    Security token hook

    Anyone knows where to buy?? The little hook (or string) to be attached at the corner of all those bank tokens or OneKey device...
  15. Kb27

    Dell ships with Superfish

    If you have one read on: http://arstechnica.com/security/2015/11/dell-does-superfish-ships-pcs-with-self-signed-root-certificates/ Dell's response http://en.community.dell.com/dell-blogs/direct2dell/b/direct2dell/archive/2015/11/23/response-to-concerns-regarding-edellroot-certificate
  16. TyreShield

    WHAT is

    A notable 34 percent of the respondents to our recent 2014 Public Safety Industry Study have moved or are considering moving data applications to a cloud-based solution over the next three years. This is a trend occurring across many industries. At the same time, current news headlines have caused discussion and doubt about the security of cloud services. So, what is ‘the cloud’, really? Is it secure or insecure? How can we properly leverage cloud services in a public safety environment? The term “cloud” comes from the standard symbol that network engineers have used to represent the internet for decades. On diagrams of organizations’ network devices and cabling, it’s an abstract concept which represents everything outside of the engineer’s control and sight. This abstractness has translated into the way we talk about cloud services today – we refer to ‘the cloud’ in a broad sense as some conceptual place we outsource our data for storage or processing. We might perceive internet-based services differently today if the standard symbol had been a menacing dragon, or perhaps most accurately, a question mark. So what is “the cloud”, really? The first and most crucial thing to understand is that cloud services aren’t abstract at all. The cloud is essentially a term for other organizations’ computer systems. Every bit of data we send to a cloud service provider is ultimately stored in some form on real hard drives, traverses real network cabling, and is processed by real software. Cloud providers use similar technologies to those we use within our own organizations. However, they do so at an exponentially larger scale, allowing them to offer services to many organizations simultaneously and at significant bulk cost savings. When we think about the cloud this way, our perspective should change. “The cloud” isn’t inherently more or less secure than any other digital system. These services are tools of varying quality which we can use to cost-effectively centralize our data storage, applications or processing. They provide us access to centrally-hosted hardware and software that may be more cost- and time-effective than in-house solutions. This centralization does provide an opportunity for improved security. Our data can be stored in a single defensible location, with uniform security controls. Since many organizations’ networks have grown too large and too piecemeal for limited IT staff to monitor accurately, a homogenous environment can make security monitoring and management more effective, less costly, and easier to handle. In an era of budget cutbacks, this can be a big help in getting our networks under control. However, cloud services come with an equal amount of security risk if they’re not used properly. We must keep in mind that cloud services still reside on real computer systems. First, we need to be fully aware of what data we are sending to the cloud provider. Are we certain we want to send all of our data outside our network? Secondly, we have to evaluate the level of physical and logical data security the cloud provider offers. What security controls do they have in place? Who has access to your data? How often do they perform certified security audits and scans, and can we see the results? Are they properly insured? What are their retention and destruction policies? Since cloud providers may spread data over many systems, in certain cases we may also be concerned with which countries our data is physically stored in. Next, we need to properly monitor the security of our data. If we rely on the cloud provider’s security monitoring, we need to understand what it involves and how soon we will be notified of an attack or data breach. Preferably, we should be receiving meaningful security and access logs for our own review. Lastly, we must ensure that our data is secure as it is transmitted to and from the cloud provider. We’re transferring our sensitive data to the cloud provider, and it may be at its most vulnerable as it is transmitted between our networks. We must ensure it is properly encrypted and controlled in transit as well as at both endpoints. Cloud-based services can provide cost savings, centralization, and easier management and monitoring of data and applications for public safety organizations. They can also provide a standardized and defensible security platform for our data and applications. Despite this, we must carefully evaluate these services as what they actually are: off-premise computer systems which are only as secure as they are designed, implemented, and monitored to be. By understanding this and asking the right questions, we can make educated decisions about how we can best leverage cloud service providers. Lesley Carhart is the Incident Response Team Lead for the Motorola Solutions Security Operations Center. She has 14 years of experience in information technology, including computer networking and tactical communications. For the past five years, she has focused on security, specializing in digital forensics. http://communities.motorolasolutions.com/community/north_america/fresh_ideas/blog/2014/09/25/what-is-the-cloud-and-how-secure-is-it
  17. http://www.bloomberg.com/news/articles/2015-08-14/vw-has-spent-two-years-trying-to-hide-a-big-security-flaw Thousands of cars from a host of manufacturers have spent years at risk of electronic car-hacking, according to expert research that Volkswagen has spent two years trying to suppress in the courts. “Keyless” car theft, which sees hackers target vulnerabilities in electronic locks and immobilizers, now accounts for 42 percent of stolen vehicles in London. BMWs and Range Rovers are particularly at-risk, police say, and can be in the hands of a technically minded criminal within 60 seconds. Security researchers have now discovered a similar vulnerability in keyless vehicles made by several carmakers. The weakness – which affects the Radio-Frequency Identification (RFID) transponder chip used in immobilizers – was discovered in 2012, but carmakers sued the researchers to prevent them from publishing their findings. Vehicles that used Megamos Crypto for some version/year. The models in bold are those that the research team experimented with.
  18. http://www.newsweek.com/airport-security-fails-detect-95-fake-explosives-weapons-337932 Airport Security Fails to Detect 95% of Fake Explosives, Weapons As air travelers, we take off our shoes, remove our belts, have our bodies scanned and condense our liquids into mini bottles—and it all may be for naught. An internal investigation of the Transportation Security Administration (TSA) found that undercover investigators were able to smuggle fake explosives and weapons through checkpoints in 95 percent of trials, which they conducted at dozens of America’s busiest airports. Officials did not disclose when the testing took place, other than to say it ended recently. In the trials, Department of Homeland Security (DHS) investigators posed as ordinary passengers. They carried out 70 tests, all of which included trying to sneak a banned item through security. Officials briefed on the results told ABC News that TSA agents failed 67 of the 70 tests.
  19. 1. Which power saver is compatible with the installation of ITB-100SPW wifi. 2.
  20. Civic2000

    Teen

    A video footage of an argument between a teenager and two officers from security firm Cisco Certis has gone viral on Facebook (Photo: Facebook / Screen grab) An incident involving an argument between a 16-year-old boy and two auxiliary police officers from Certis Cisco has drawn criticism from online users after a video of the encounter went viral on Facebook. The three-and-a-half minute video clip shows the boy and two officers at Bedok Reservoir, and when the officers told him not to fish in non-designated areas and to leave, the boy refused, Channel NewsAsia reported. The commercial security company said in a statementthat the incident “could have been better managed in a more professional and diplomatic manner”. Certis Cisco also said that it "trains and expects officers to be above board and exhibit values of professionalism and integrity", and that serious action will be taken against those who contravene such values. http://features.insing.com/feature/teen-s-argument-with-security-officers-in-singapore-caught-on-video/id-893f3101/ After watching the video, I am of the view that these 2 Cisco Officers are big bully. Demanding the teenager to produce his ID in a very threatening manner.
  21. Fishy

    Courses for security guard

    I got a relative here who has been jobless for quite a while and decided to join the security industry as a security guard. He only has 3 Nlevel passes and never been in the industry. He was told by some security companies that he needed to attend some WSQ courses and I managed to help him locate a list of providers http://app2.wda.gov.sg/wsq/Contents/conten...id=983&Pg=3 Issue here is today is a sunday, the offices are closed. Hes got a lot of queries but i cannot locate them on the net. Any kind souls here knows roughly how much is the course and how many days is the course? is it funded 100% by govt or is it cofunded by the security company and the government? Thanks a lot for whatever information you can provide,
  22. Saw this wheel cramp in a multi storey carpark.
  23. Kurrypokteh

    Steelmate 838E Car Security

    Hi bro out there! Anyone knows how much is average market price for installing the Steelmate 838E car security system? And where can I go to get it installed? Also one more thing....can the remote boot release by done for a Hyundai Tucson 2008 model? or it can only be done on a sedan? Thanks in advance!
×