You can use this to test out your webserver:
On a sunny Tuesday morning, a group of faculty and staff from Pangasinan State University (PSU) Alaminos Campus made the trip to the BNSHosting.net offices for a site visit. The members were made up by Mr Christian Paul Cruz, Mr D’ alchemy Mones and Mr Rodolfo Raborar II. The purpose of the visit was to provision their appointment web app and to learn more about the inner workings of a successful hosting company. The parties also explored potential collaboration opportunities between BNSHosting.net and PSU.
Upon arrival, the PSU delegation was warmly greeted by the BNSHosting.net team and given a tour of the facilities. They were able to see firsthand the technology and infrastructure that powers the hosting company’s services. They were particularly impressed by the company’s state-of-the-art server room, which houses high-performance servers that keep websites and applications running smoothly for clients around the world.
The PSU group also had the opportunity to meet with key members of the BNSHosting.net team who provided valuable insights into the challenges and opportunities of running a hosting business. The team shared best practices, strategies and technologies they used to manage the large number of servers and customers they serve.
One of the highlights of the visit was a discussion of potential collaboration opportunities between BNSHosting.net and PSU. The two organizations discussed the possibility of offering internships and training opportunities to PSU students, as well as the development of joint research projects. The BNSHosting.net team also expressed interest in collaborating with PSU’s computer science department to develop new hosting-related technologies.
Overall, the site visit was a valuable experience for both the PSU delegation and the BNSHosting.net team. It provided an opportunity for the two organizations to learn from one another and explore ways to work together in the future. The PSU group left the BNSHosting.net offices with a deeper understanding of the hosting industry and new ideas for collaboration.
The visit ended with a promise for a follow-up meeting and with hope of forming a partnership. The PSU delegation thanked the BNSHosting.net team for their hospitality and for the valuable insights they gained during the visit.
The SMS scams are in the news lately. Here is what you need to know. In Australia, SMS scams have caused as much as 381m in losses.
While the Telcos and Government grapple with what best to do to reduce this, there are something you can do to stop spam on your mobile phone. You can block these spams by tagging them!
For iPhone, all you need is in Settings
Got a spammy-looking message in your Messages inbox? As long as you have iOS 7 or later installed on your iPhone, the steps are pretty simple. Open the message, tap Contact, then tap the little “i” button that appears.
Next, you’ll see a (mostly blank) contact card for the spammer who sent you the message. Scroll down to the bottom of the screen and tap “Block this caller.” C-ya, spammer.
For Android, it’s a little more complicated
The SMS-blocking situation for Android is a bit more complex than for iOS—although to be fair, it wasn’t possible to block text messages on the iPhone at all until iOS 7 came around.
While the “stock” Messaging app won’t let you block SMS spammers, there’s a plethora of apps on the Google Play store that’ll do the job…or used to, anyway.
Working in tandem with the standard Messaging app, third-party SMS-blocking apps (like SMS Filter or Mr. Number) let you create and manage what’s called a “blacklist”—that is, a list of phone numbers that you don’t want to hear from again. Other anti-spam apps, like Postman and Spam Blocker, will go ahead and flag suspected SMS spam.
But thanks to a new restriction in the latest version of Android—namely, that only one app at a time may tap into your SMS messages—many of these handy SMS spam-blocking apps have been rendered useless.
Now, it’s very possible that your particular Android phone hasn’t been updated to Android “KitKat” yet, in which case you’re free to shop around for a dedicated SMS blocking app.
What data was taken?
Optus says the stolen data includes names, email addresses, postal addresses, phone numbers, dates of birth, and for a portion of the affected customers, identification numbers including passport numbers, driver’s licence numbers and Medicare numbers.
The dump of records released by the forum user contained all this information.
How common is this method of attack?
“Unfortunately, it can be pretty common,” Josh Lemon, a digital forensics and cyber incident expert at SANS Institute, said. But he said attackers tended to not target a single organisation. They usually scan across the internet looking for known vulnerabilities and exploiting those vulnerabilities all at once, he said.
“So for a threat actor to specifically just go after [one company] is a little bit unique in that sense.”
In an email sent to its members on Friday, Sep. 16, the coffee chain said that it had discovered “unauthorised activity online” and “some unauthorised access” to customer details, such as name, gender, date of birth, mobile number, email address and residential address.
Following this incident, Starbucks added that relevant authorities have been informed and that the firm is assisting them on this matter.
Singapore shipbuilder Sembcorp Marine has suffered a cyberattack that left information on employees and operations compromised, the firm announced Thursday.
Home-grown fashion label Love, Bonito has been fined $24,000 over a 2019 data breach which saw personal information of more than 5,500 customers compromised. The root cause: The administrator account of a software used by Love, Bonito was compromised. It was used to manage its e-commerce website. An unknown third party accessed and obtained customers’ personal data via this gap.
Countermeasure: Try to apply Access control list to sensitive parts of your webapp. So that even if the admin account was compromised, it could not log in from just anywhere. It had to be accessed from within specific locations. Also enable multi factor authentication.
The short story:
HOSPITALITY platform RedDoorz was found to have leaked the details of 5.9 million customer records in the largest data breach incident since Singapore’s Personal Data Protection Act came into force. The root cause was traced to the API key embedded in the mobile app that the developers used.
Even if ReDoorz had several pentests done. The mobile app was not screened. It however helped to reduce the overall fines levied on it.