Google Analytics

Search This Blog

Tuesday, May 23, 2017

Is your Network Protected against Botnets?

By Sumit Bansal

Having been in the threat marketplace for several years, botnets are still successful today as it provides a powerful cloud computing network for hackers to spread malware and spam.

Like any other malware, botnets are introduced to the computer network through email attachments, websites and USB sticks. As the user accesses these files or compromised websites, malware from the botnets begin to spread and exploit vulnerabilities on the system.

Sumit Bansal, Director for ASEAN and Korea, Sophos

In a recent research on global spam by SophosLabs, it was found that the global volume of spam dropped by more than half just before Christmas and continued to stay at around the same level, believed to be due to the notorious Necurs botnet going quiet.

However, an old-school type of scam was seen to have resurfaced just last month with huge success. Known as pump-and-dump, the scam inflated the stock price of Incapta, a media holding company, encouraging the public to buy into the scam, thus pumping up the stock further.

Monday, May 22, 2017

Symantec ISTR 22 : Alarming Increase in Politically Motivated Targeted Attacks

May 5, 2017:

Cyber criminals revealed new levels of ambition in 2016 – a year marked by extraordinary attacks, including multi-million dollar virtual bank heists and overt attempts to disrupt the U.S. electoral process by state-sponsored groups, according to Symantec’s Internet Security Threat Report (ISTR), Volume 22, released today.

“New sophistication and innovation are the nature of the threat landscape, but this year Symantec has identified seismic shifts in motivation and focus,” said David Rajoo, Director, Systems Engineering, Malaysia. “The world saw specific nation states double down on political manipulation and straight sabotage. Meanwhile, cyber criminals caused unprecedented levels of disruption by focusing their exploits on relatively simple IT tools and cloud services.”

Symantec’s ISTR provides a comprehensive view of the threat landscape, including insights into global threat activity, cyber criminal trends and motivations for attackers. Key highlights include:

Subversion and Sabotage Attacks Emerge at the Forefront

Cyber criminals are executing politically devastating attacks in a move to undermine a new class of targets. Cyber-attacks against the U.S. Democratic Party and the subsequent leak of stolen information reflect a trend toward criminals employing highly-publicized, overt campaigns designed to destabilize and disrupt targeted organizations and countries. While cyber-attacks involving sabotage have traditionally been quite rare, the perceived success of several campaigns – including the U.S. election and Shamoon – point to a growing trend to criminals attempting to influence politics and sow discord in other countries.

Friday, May 19, 2017

Microlink Launches IoT Solutions for Flood Mitigation, Energy Management and Plantations

May 15, 2017 -

Microlink Solutions Berhad (‘Microlink’), a local ICT solutions provider, today shares that it is launching three new Internet of Things (IoT) applications that can address some of the recurring issues affecting the operations of Malaysia’s Flood & Natural Disaster Mitigation, Energy Management and Plantations sectors.

Simply known as the Smart Environmental Management System, Smart Energy Management System and Smart Plantation System respectively; Group CEO of Microlink, Chia Yong Wei hopes that the introduction of these three IoT solutions will benefit industries that have been underserved by the IoT players so far.

Thursday, May 18, 2017

IT News Week 3 May 2017

For IT News Week 2 May 2017.

For this week / last week, here are / were the biggest news.
  • PR - May 18, 2017 - Western Digital Expands NAS-Optimized Hard Drive Offerings to 10TB
  • PR - May 17, 2017 - Taipei, Taiwan - COMPUTEX 2017 PQI “Touched by Intelligence” Invigorate All Your Senses
  • PR - May 17, 2017 - Cb Response Defends South Korean Special Prosecutor's Office from Targeted Cyberattacks
  • PR - May 17, 2017 - NEC provides Mandarin Oriental, Kuala Lumpur with UNIVERGE SV9500 Communications server
  • PR - May 17, 2017 - Siemens: TIA Portal V14 engineering framework: increased productivity, reduced time to market
  • PR - May 16, 2017 - Silver Peak Tops 400 Unity EdgeConnect Customer Deployments Worldwide
  • PR - May 16, 2017 - Empowering Businesses with Enterprise-Grade Swan Cloud Accounting
  • PR - May 16, 2017 - Government Joins Finance Sector At the Top of the Cyber Attack List
  • PR - May 16, 2017 - U Mobile launches Unlimited Hero P78 with Unlimited High-Speed Data & Unlimited Calls to All Networks
  • PR - May 16, 2017 - Customer Experience Management Key for Successful Digital Transformation
  • PR - May 15, 2017 - Monster® grows global channel reach with new international collaboration with Brightstar Corp
  • PR - May 11, 2017 - 11street Signs MOU with MABOPA and Initiates ‘Pesta Buku Online’

Tuesday, May 16, 2017

The Best Advice on WannaCry Ransomware

1.) For technical people


2.) For consumer



WannaCry Commentaries - Part 1

1.) Acronis

Nikolay Grebennikov,VP of Engineering

“People, and businesses hear ‘ransomware’ and think such an attack can’t happen to them. The fact is that it can, and in fact, just today – Telefonica was hit by a very aggressive version of the Wcry ransomware. 47 percent of businesses were under ransomware attacks last year and that’s growing. Just look at Telefonica for the latest proof. The real question businesses, hospitals and telcos should be asking themselves is how can I protect myself from a ransomware attack that is seemingly inevitable. The answer – a reliable backup solution that includes active protection against ransomware attacks. Acronis Backup 12 Advanced and Acronis Active Protection can prevent damage from such ransomware and this solution is available for businesses today.”

Monday, May 15, 2017

CoreLogic Deploys Commvault to Drive Digital Transformation - Case Study

Researchers have predicted that the amount of data generated by businesses will double every two years and increase by a factor of ten by 2020. With the volume of data exploding across businesses and industries, and customers demanding more than ever before, business leaders are now forced to focus their efforts on embracing data-driven insights to make strategic decisions as well as deploying advanced technology to store and manage this growing volume of data.

With this, backing up data, a critical aspect of any data management strategy, has now become a daunting task, especially for businesses who still uses legacy systems as part of their backup strategies. With companies having to backup petabytes of customer data, traditional duplication methods will risk threatening the operations, security, and revenue of a company should critical failures and outages occur. The solution? The migration to a cloud storage infrastructure elevates the stress of data management and can address the increasing complexity and demands of businesses’ backup requirements.

Sunday, May 14, 2017

No need to cry - Run Windows Updates Now !!!

As of today, here are the things everybody needs to know about WannaCry ransomware:

In plain English, the first thing you need to do in the morning is to run Windows updates before opening your emails - this is because this Trojan-based malware exploits one of the vulnerabilities in Windows.

According to IBM X-Force, it affected mostly Windows XP, Windows 8 and Windows Server 2003; according to Symantec, it targets data server because it will attempt to shutdown MS SQL Server services and email exchange services whilst encrypting all physical files.

I totally agree with Symantec on best practices to protect against ransomware :

Saturday, May 13, 2017

Backup Files to SD Card in Android Phone

Imagine you have a scenario where the phone is having limited storage space....

If you are a heavy WhatsApp user like most people do, try to 'Clear chat' of your frequently used WhatsApp group.

Friday, May 12, 2017

Sunway Innovation Labs to Propel Technopreneurship

May 5, 2017 - Bandar Sunway -

Tan Sri Mohd Irwan Serigar Abdullah, Secretary General of Ministry of Finance and Chairman of Malaysian Global Innovation and Creativity Centre (MaGIC), launched the Sunway Innovation Labs (Sunway iLabs) yesterday at Menara Sunway, Sunway City,with Tan Sri Dr Jeffrey Cheah AO, Founder and Chairman of Sunway Group, and Chancellor of Sunway University.

Tan Sri Mohd Irwan Serigar Abdullah, Secretary General of Ministry of Finance and Chairman of Malaysian Global Innovation and Creativity Centre (MaGIC) officiating the launch of the Sunway Innovation Labs. Looking on are Tan Sri Jeffrey Cheah AO, Dr Elizabeth Lee, Matt van Leeuwen, Dr Lee Weng Keng, Professor Graeme Wilkinson and Evan Cheah.
Sunway iLabs will function as a start-up incubator as well as runaccelerator programmes,act as a micro ecosystem in encouraging development of the start-up ecosystem within the country.The unique not-for-profit smart partnership concept will see Sunway University, Sunway Group, and Sunway Ventures working together in a triple helix innovation model, which combines the strengths of stakeholders across academia, industry and government within a collaborative space. Their aim is to foster entrepreneurship and stimulate market-driven innovations enabling entrepreneurs to scale their business faster.

At the Sunway iLabs, students from Sunway University will be able to apply their talent and technical expertise to growth-hack Sunway Group’s 12 business units. Sunway Ventures, the venture arm of Sunway Group which was set-up last year to drive the organisation’s future growth will fund viable startups that are synergistic to Sunway’s businesses.

IT News Week 2 May 2017

For IT News Week 1 May 2017.

For this week / last week, here are / were the biggest news.
  • PR - May 11, 2017 - Astro launches “NJOI Now” to offer free video streaming service
  • PR - May 10, 2017 - Former SAS-Boss becomes new Webtrekk CEO
  • PR - May 9, 2017 - OutSystems Named a Leader in Gartner’s 2017 Magic Quadrant for Enterprise High-Productivity Application Platform as a Service
  • PR - May 8, 2017 - Fusionex Wins Technology Partner Award from Amazon Web Services
  • PR - May 4, 2017 - Siemens enhances presence in Myanmar with strong partnership in the ports
  • PR - May 3, 2017 - BP Healthcare’s Doctor2U partners with Microsoft for its Digital Transformation journey
  • PR - May 3, 2017 - Registration is Open for the First Global Leadership Programme
  • PR - May 2, 2017 - Taipei, Taiwan - CyberMedia and TAITRA Announces Partners for CyberMods 24hrs
  • Mergermarket - Apr 26, 2017 - Asia's EMU M&A rocketed 323% YoY in Q1 2017

Thursday, May 11, 2017

Three traps to avoid on the path to digital transformation

By Ben Pring, Co-Director, Centre for the Future of Work, Cognizant, and Co-Author of “What to Do When Machines Do Everything: How to Get Ahead in a World of AI, Algorithms, Bots, and Big Data” (Wiley, February 2017)

Ben Pring, Co-Director, Cognizant
Within the next ten years, disruptive technologies such as mobile internet, cloud technology, 3D printing, and advanced robotics are expected to result in 30% GDP growth in Southeast Asia alone. There is no doubt that across industries, these emerging technologies are the biggest disruptors today. However, many organisations undergoing digital transformation are crumbling under their own weight. Business leaders are struggling to set a digital strategy, shift organisational structures, and remove the barriers that are keeping them from maximising the potential impact of new digital technologies.

One of the key determinants of digital transformation is the right business model. In this context, the business model is the process architecture, and the supporting organisational model used to run the business.