Google Analytics

Search This Blog

Tuesday, July 31, 2012

Sophos Offers Free Antivirus App for Android Users

As part of its Complete Mobile Security initiative, Sophos has announced the availability of Sophos Mobile Security, a free lightweight anti-virus app that protects Android devices against malware, privacy issues and hardware loss—without reducing performance or battery life. Sophos Mobile Security is available for free download from Google Play.

The amount of mobile malware is rapidly increasingly, in particular among Android, the leading smartphone operating system. In May, Naked Security conducted a survey of 900 readers, which found that 39 percent used a smartphone running Android. According to Juniper Networks and F-Secure respectively, the growth rate in Android malware last year increased 155 percent over 2010, and the number of Android malware families nearly quadrupled from 2011 to 2012.

Using up-to-the-minute intelligence from SophosLabs, the company’s global network of threat intelligence centers, Sophos Mobile Security automatically scans apps as users install them, blocking undesirable software and malicious code that can lead to data loss and unexpected costs. In addition to safeguarding devices from malicious apps and other risks, Sophos Mobile Security locates lost or stolen Android devices and provides a remote lock to shield personal information from unintended users.

Later this year, Sophos plans to offer a managed Enterprise version of Sophos Mobile Security with enhanced functionality. Targeting corporate users, it will help to provide better protection for corporate devices and data.

To download Sophos Mobile Security for your Android, use the QR code below:

Twitter Blackhole Malware Attack Spreading Now

In another report, IT security and data protection firm Sophos is warning Twitter users to be cautious following the discovery of a widely spread malware attack on the micro blogging site. Malicious links, claiming to be an online photo of the Twitter user, are at present being spammed out across the social network. The links point to Russian web pages that ultimately attempt to infect Windows PCs using the Blackhole exploit kit.

At present the dangerous tweets say "It's you on photo?" or "It's about you?" followed by a link.

The cybercriminals behind the campaign could change the wording used in the dangerous tweets at any time.

"If you see tweets like this, please do not click on them," said Graham Cluley, senior technology consultant at Sophos. "There isn't a photo of you waiting at the end of the link - and the accounts that are spreading the messages have either been compromised by hackers or have been created by hackers with the purpose of spreading the dangerous links."

"There's a real danger that if Twitter users have not properly protected their PCs, and unless they are warned of the risk, that many people will click on the links without suspecting that they are putting their computer and personal data at risk," warned Cluley.

AIMS Complements its Managed Services Portfolio with ‘Caching by AIMS’

AIMS Group (‘AIMS’) the country’s leading carrier-neutral data center, today announced their expansion of its Managed Services portfolio that currently includes different levels of IT infrastructure and application hosting at the data center.

AIMS’ newest addition is a cloud-model based service known as ‘Caching by AIMS’.

According to Henry Chuah, Vice President, New Business, the new managed service is a timely and strategic effort to capitalize on the current surge of Internet traffic and demand - primarily from online media usage, in the country.

“Currently we expect the Malaysian Internet Service Providers (ISPs) to collectively spend about RM60 million in international bandwidth cost for the whole of 2012. But with the introduction of Caching by AIMS, this cost can be reduced by up to 50 %”.

“In particular, AIMS’ ISP customers are seeing much bigger demands for faster connectivity, driven by the market’s increasingly ferocious appetite for more real-time news and updates, online gaming and retail applications, and streaming videos – from both fixed and mobile customer end-points.”

He says that while this is a great opportunity for ISPs to monetize these demands, they are also facing significant technical and economic challenges related to the increasing streaming by their subscribers of their broadband which is now required.

‘Caching by AIMS’ – What Is It

ISPs are experiencing cuts into their profits in order to add on broadband resources to meet the quality demand of new media

However with this new AIMS managed service, they can resolve the issue by remaining cost-effective while at the same time delivering faster, providing more reliable access to video, music and social and news sites links to their subscribers.

Henry explains how ‘Caching by AIMS’ works is by collating the number of content downloads – could be a media file, YouTube video, torrents, movies and etc, from the Internet. Once the download’s reach a set number of hits, indicating its popularity, a copy of the mentioned data items are captured and stored at AIMS’ facility.

“Therefore, for future requests for the same content, the ISP can deliver very efficient service so that the end-users can experience even faster download as the content source is now ‘virtually’ closer to them as it is being cached at the AIMS’ data centres located across the country, rather than on servers located overseas,” he says, adding that the subscription to ‘Caching by AIMS’ will allow local ISPs to provide smooth, delay-free streaming to their subscribers.

Another added advantage is that AIMS’ cache servers do regular check on the cache contents, and those no longer needed are automatically deleted from the user’s servers – this is part of AIMS automatic management process of the servers.

“AIMS is extremely particular about maintaining high standards of security when it comes to the safe keeping of subscribers’ confidential information. Nothing is compromised here,” shares Henry.

AIMS Group CEO, Chiew Kok Hin says, “By offering our own cloud-based flavour of services starting from our caching service, the robust AIMS data center proves that they are not only the pioneers but also the leaders in the space of co-location, storage, interconnectivity and managed services.”

“Although this service is newly introduced, we are very confident that it will soon see significant uptake by ISPs, content owners and advertisers when they see the huge revenue advantage that AIMS’ caching can bring to their business,” ends Chiew.

Monday, July 30, 2012

Sophos Makes Unified Threat Management Complete by Adding Endpoint Security

Sophos announced the availability in Malaysia, of Sophos UTM 9, the first UTM specifically designed to integrate gateway security and endpoint security in a single hardware or virtual box. Organizations and IT teams no longer have to spend considerable time and resources on configuring multiple point solutions to protect their entire IT infrastructures. Sophos UTM 9 provides complete security protection, regardless of location; it combines the company’s award-winning endpoint protection and unified threat management solutions into a single management console.

"When I first identified the UTM market, my vision was it would eventually encompass everything that a company would need to protect against threats," said Charles Kolodgy, research vice president, IDC. "Endpoint security management was neglected and/or relegated to separate products. Recognizing that mobile devices severely complicate endpoint management, Sophos is incorporating policy management for all endpoint devices, regardless of type and network, into their UTM solutions."

Astaro Security Gateway 320 front 

As the complexities of securing all networks have grown, so have the struggles for businesses to get the best out of the many point security solutions they have purchased. UTMs have been an increasingly popular way to address this problem, but until now, they haven’t been complete. By adding the ability to deploy and manage endpoint security, Sophos finally makes it easier for IT teams to get all the protection they need.

According to the International Data Corporation (IDC) Worldwide Quarterly Security Appliance Tracker, in the first quarter of 2012 (1Q12), the UTM market represented 28.5 percent of security appliance revenues due to 12.2 percent year-over-year growth. This trajectory presents tremendous opportunities for VARs that partner with vendors offering these kinds of solutions. “Our customers are looking for solutions that can simplify their IT management. With the new Sophos UTM solution, time-strapped IT managers can keep their organization’s endpoints, network and data safe from threats, wherever their people work, whatever devices they use—in a matter of minutes,” said Todd O’Bert, president, Productive Corporation. “Sophos is able to provide an integrated level of protection unmatched in the industry, which is a tremendous value proposition for any solution provider or reseller.”

Sophos UTM: New Features

Proven Endpoint Protection

Protects everywhere, using the cloud to secure and monitor staff wherever they are, and extend security gateways to deploy and manage endpoint protection as well as device control. Sophos’ innovative approach to endpoint protection uses its LiveConnect cloud service—users can always manage all of their endpoints, no matter where they are or how they’re connected. Computers are kept up to date with antivirus protection and new policies that can be rolled out at any time.

HMTL5 VPN: Device-independent secure access for users wherever they are

Enables secure remote application access without installing any software on the desktop. HTML5 VPN portal lets users connect to internal resources wherever they are, no matter the device they use. Sophos’ browser-based portal uses HTML5, giving access through applications like VNC, remote desktop, SSH and more.

Wireless Hotspot Support

Manages internet access for guests and visitors with customizable wireless hotspots. With the advent of bring your own device (BYOD), organizations struggle to provide simple and secure guest wireless access. Sophos’ wireless security provides this, while extending security policies to all guests and enabling businesses to set up guest access quotas by time and/or bandwidth.

Integrated Sophos Anti-Virus Engine

Scans email and web traffic with Sophos’ award-winning antivirus technology as well as a second commercial engine (from Avira). Sophos scans viruses, spyware, worms, Trojans, and adware in single scan, and protects against zero-day-attacks.

“UTM 9 marks a milestone not only for Sophos, but for organizations worldwide. In the year since we acquired Astaro, we’ve been able to bring to market an integrated industry-first solution that’s game-changing for Sophos partners and easy to use for customers,” said Stuart Fisher, Managing Director for Asia Pacific at Sophos. “This solution was conceived not only by our great integrated development team, but also by our passionate and active users who provided countless feature recommendations in our forums. And thanks to our users, we’re excited about our roadmap.”

Stuart Fisher, Managing Director for Asia Pacific at Sophos 

“With Sophos UTM, our IT managers can securely connect employees from anywhere or any device without having to worry about compatibility issues, without having to worry about ‘connect anywhere’ issues,” said Craig Tait, senior consultant, third-i international limited. “By integrating endpoint into the gateway and keeping it simple, we can keep our network hacker-free and our employees productive.”

Sunday, July 29, 2012

The ICT Trends Recognised by iDA Singapore (July 2012)

iDA Singapore will be organising a conference called 'Co-Creating The Future Infocomm Technology Roadmap 2012' on 17 Aug 2012, Singapore.

Based on the topics that speakers will be talking about, we are able to identify which ICT trends are considered critical by iDA Singapore for the benefits of public interests.
  • Big Data
  • Cloud computing
  • Internet & social media & business - Digital economy
  • Green IT
  • IT security
  • Automation

This is about it. If you want to sell to Singaporean something, these are the things to focus.

And they are not not alien anyway, these trends are what is happening around the world and even in Malaysia.

By looking at Malaysia Technology News, it is not difficult to spot such trends from the news published there.

Big Data

Cloud Computing

Green IT

IT Security

Digital Economy


What else you are expecting ? A.I, BYOD, Enternet Fabric, Storage, Mobile ?

More on trends.

100 Best Malaysian Technopreneurs Competition 2012

According to TheStar, the is an ongoing hunt for 100 best Malaysian technopreneurs.

It is organised by The Malaysian Scientific Association (MSA) who is on the look out for the best innovative ideas to showcase at the 4th Technopreneurship and Innovation Symposium and Exhibition (Tise) during which it will also host the 100 Best Technopreneurs Competition.

The competition is open to intellectuals and professionals aged 21 to 35 and studying in universities locally or overseas.

Winners' benefits:

  • Three-month internship with European companies based in Malaysia. This is because the competition is in partnership with EU-Malaysia.
  • MSA will help winners to obtain fundings for their ideas.

The closing date for the competition is Sept 10.

For more information on the Tise and the 100 Best Technopreneur Competition, go to or

Saturday, July 28, 2012

TM Urges Customers To Disable 'Remote Management' Function of Streamyx Modem

TM Urges Customers To Disable 'Remote Management' Function of Streamyx Modem

Remote management is referring to the following communication protocols which Internet broadband router modem would usually support, these protocols are:
  • FTP
  • HTTP
  • ICMP
  • SNMP
  • SSH
  • TFTP
Under the step by step guides, TM urges all of these protocols to be disabled for remote connection via the Internet (WAN connection) except for ICMP which is responsible to support the PING function.

It provides guides for all TM supplied and approved router modems only.

TM also urges its customers to remain vigilant and to safeguard your account details including your unique User ID and/or Password by keeping it secret and confidential so that your personal data are not compromised. Please ensure that you do not knowingly or accidentally share, provide or facilitate unauthorised or accidental access of the account so that there will be no instance of illegal usage by any third party/ fraudster of your account.

Friday, July 27, 2012

Migration Tool for Microsoft SQL Server to MySQL

Continuing to enhance the MySQL user experience on Microsoft Windows, Oracle announced a new migration tool that allows users to easily and quickly migrate data from Microsoft SQL Server to MySQL.

In addition, a new “MySQL for Excel” application plug-in enables data analysts to seamlessly access and manipulate MySQL data within Microsoft Excel, without requiring prior MySQL technical knowledge.

An enhanced version of the MySQL Installer for Windows is also available, helping users through the setup of advanced security and logging features, and a new MySQL Notifier application for Windows allows users to easily monitor and manage MySQL instances.

All tools are available for download now.

By using MySQL over Microsoft SQL Server 2012, users can reduce their database total cost of ownership by up to 90 percent.

The latest MySQL release MySQL 5.6, currently available as a Development Milestone Release, additionally delivers numerous improvements for Windows.

New Features Further Improve MySQL Manageability and User Productivity on Windows The new migration tool is integrated into MySQL Workbench, which allows the visual design, development and administration of MySQL databases, and now provides a complete solution for migrating Microsoft SQL Server database tables and data to MySQL with less time and effort.

With MySQL Workbench, SQL Server developers and DBAs can quickly and easily convert existing applications to run MySQL on Windows as well as Linux and other platforms.

Addressing the growing demand from business analysts using MySQL for data marts and analytic applications, the new “MySQL for Excel” application plug-in allows users to easily import, export and manipulate MySQL data.

Enabling users in most cases to go from download to development in three minutes or less, the enhanced MySQL installer provides point-and-click configuration of new MySQL database instances, as well as advanced logging and security features.

The new MySQL Notifier application for Windows helps developers and DBAs to easily monitor, start and stop their MySQL database instances, with the Microsoft SQL Server look and feel.

Silver Peak Expands Virtual Product Line for Accelerating Data Mobility

Silver Peak Systems, the leader in accelerating data movement over distance, extended its software-based product portfolio for wide area network (WAN) optimization with the introduction of the VX-500 for small remote sites, and the VX-6000 and VX-7000 for data centers, regional offices and disaster recovery (DR) sites. The new virtual products broaden Silver Peak’s comprehensive portfolio of high-performance virtual solutions and further extend Silver Peak’s leadership position in Virtual WAN optimization.

As enterprises move data from data centers to offsite locations they must contend with long distances and low-quality shared or public networks that limit the performance of data movement over distance. This can hinder recovery point objectives (RPO) for disaster recovery and make applications perform poorly. Silver Peak solves these challenges with its Virtual Acceleration Open Architecture (VXOA) software,which uses real time acceleration techniques for moving data quickly across the WAN. Silver Peak VXOA delivers maximum flexibility by running on any standard hypervisor and a variety of hardware platforms such as stand-alone servers, routers, switches, server blades, and storage arrays. All of the Silver Peak virtual products are available for download from the Silver Peak Virtual Marketplace, allowing customers to move data up to 90x faster over existing infrastructures.

“With the addition of our new virtual products, Silver Peak continues to lead the industry with the fastest and most cost-effective software solutions for moving large amounts of databetween any size data center, branch or disaster recovery site,” said Damon Ennis, vice president of product management for Silver Peak. “The Silver Peak virtual marketplace and our software-based solutions have revolutionized the delivery, deployment and pricing of WAN optimization. All or our software solutions are available for free, self-service trials directly from our website, allowing anyone to start accelerating their data mobility immediately.”

Silver Peak expands its virtual product line at the low-end with the VX-500, which accelerates smaller networks with up to 2 megabits-per-second (Mbps) of throughput and is ideal for remote sites with T1/E1 multiprotocol label switching (MPLS) or cable/DSL connections. The VX-500 supports up to 8,000 simultaneous connections—400x more than the competitive products. The Silver Peak VX-6000 and VX-7000 were added to complement Silver Peak’s mid-range products, providing acceleration for 100 Mbps and 200 Mbps connections respectfully.

With the addition of the new virtual products, Silver Peak extends its lead over the competition in offering the highest-performance and most cost-effective software solutions for any size office and any level of network throughput. This includes the Silver Peak VRX virtual solution that supports 1 Gbps of WAN throughput and up to 256,000 simultaneous sessions , and the Silver Peak NX-10K that supports 10 gigabit infrastructures and up to 512,000 simultaneous sessions.

Availability and Pricing

Silver Peak’s broad portfolio of software-based solutions are available for download at: All downloads come with a free 30 day trial, which includes full support. Silver Peak VXOA software optimizes all Internet protocol (IP) traffic, runs on any hardware platform or hypervisor, and offers flexible pricing options that align with customer requirements. Pricing for the new virtual models is as follows: Silver Peak VX-500 starts US$551 for an annual subscription; Silver Peak VX-6000 starts at US$22,131 for an annual subscription; Silver Peak VX-7000 starts at US$26,557 for an annual subscription.

Thursday, July 26, 2012

Java Programming Facts and Figures (July 2012)

Java Facts and Figures
  • 97% of enterprise desktops run Java
  • 1 billion Java downloads each year
  • 9 million developers worldwide
  • More than 3 billion devices are powered by Java technology
  • 80% of mobile developers target the Java platform
  • More than 125 million Java-based TV devices have been deployed
  • Over 8 billion Java Card units have been shipped since its introduction
Oracle Introduces NetBeans IDE 7.2

Helping to further optimize the Java development experience, Oracle announced NetBeans Integrated Development Environment (IDE) 7.2.

NetBeans IDE is a free, open source IDE available for Windows, Mac, Oracle Solaris, Oracle Linux, and other Linux distributions, that enables developers to rapidly create web, enterprise, desktop and mobile applications for the Java platform, PHP and C/C++.

Highlights of NetBeans IDE 7.2 include:

  • Enhanced Developer Productivity: Native integration with FindBugs™, a popular, open source Java-based static analysis tool, provides code hints in the editor, offering immediate feedback, and code inspections that can be run across projects, thereby helping to lower costs by preventing bugs early in the development lifecycle. Coupled with other editor enhancements such as a bookmark manager; code completion in the search bar; JPA code completion and more hints and refactorings, these capabilities help improve developer productivity.
  • Improved Performance: Smarter project scanning enables the IDE to start more smoothly and noticeably faster; new background scanning allows features such as Java editing to work immediately; and UI responsiveness is not blocked by I/O operations, helping to improve performance by up to 60 percent, depending on project settings, with 10 percent improvement in average startup times.
  • Expanded Support: Interoperability with the early access release of JavaFX Scene Builder allows for opening and visual editing of FXML files with Java FX Scene Builder. NetBeans IDE 7.2 also includes FXML and CSS3 enhancements. Support for: PHP 5.4; PHP editor enhancements; PHP annotations and Symfony 2; C++11 standard and debugging improvements; Maven 3.0.4; and Groovy 1.8.6. TestNG can be selected as an alternative to the JUnit framework when creating tests. In addition, wizards for creation of TestNG based test cases and test suites are now available.

New Mac Malware Discovered, Hours Before Release of Mountain Lion

Just hours before the release of Mountain Lion, the latest version of the OS X operating system*, new malware has been discovered highlighting the need for Apple Mac users to protect their computers with anti-virus software.

Sophos researchers have discovered that the new Morcut Mac OS X malware, also known as "Crisis", has been distributed as part of a multi-platform attack, designed to hit both Windows and Mac users - embedded in an archive file which pretends to be Adobe Flash Player.

The threat, which has not yet been seen in the wild, is complex - and when run on an OS X system drops multiple components, reconfigures system settings and installs a backdoor and rootkit combination that connects to a remote server and waits for instructions from malicious hackers.

When run on Windows systems, a version of the Swizzor malware is installed instead.

"Analysis of this malware is ongoing, but Mac users are protected right now if they are running a good, up-to-date anti-virus," said Graham Cluley, senior technology consultant for Sophos. "The good news is that this threat has not been seen in the wild so far, but we are seeing increasing evidence of cybercriminals exploiting the fact that many Mac users have still not got the message that they need to protect their computers. There is much less malware for Macs than there is for Windows, but that doesn't mean it's non-existent. If Mac users are too laid-back about security and leave their bellies exposed, they're asking for trouble."

SophosLabs experts are continuing to analyse the Morcut malware, and warn that even if the threat does not break into the wild, the techniques it uses could be deployed by other malicious hackers in the future.

Sophos makes available a free anti-virus for Mac home users which protects against the threat. It can be downloaded from

Sophos products detect the various components used in the attack as Troj/JVDrop-A, Mal/Swizzor-D and OSX/Morcut-A.

Wednesday, July 25, 2012

Singapore to Take Lead in High Performance Analytics with New Centre of Innovation

SAS, the leader in business analytics software and services, is establishing a High Performance Analytics Centre of Innovation in Singapore that is supported by the Infocomm Development Authority of Singapore (IDA). In anticipation of a surge in global demand for real-time High Performance Analytics capabilities, the new Centre will develop, market and deploy innovative applications and help to position Singapore as a global leader in High Performance Analytics. The Centre will be the first of its kind in Asia.

"Singapore's forward-looking recognition of the importance of business analytics in fuelling innovation will help make it Asia's leading centre of High Performance Analytics. This brings with it economic advantages for Singapore," said SAS founder and CEO Jim Goodnight (bio), who was described by Forbes as the "King of Analytics." Goodnight participated in a ceremony here with the IDA to announce the new Centre of Innovation.

SAS has been working closely with IDA on High Performance Computing since June 2010. Data and Analytics has been identified as one of IDA's key focus areas because of its role in strengthening the information and communication technology sector that is critical to Singapore's economic growth.

"Data & Analytics is becoming a key driver of economic growth and competitiveness. IDA is pleased to work with SAS to establish its first Asia High Performance Analytics Centre of Innovation in Singapore. The Centre's role of training Infocomm professionals on Data & Analytics, and generating intellectual property through co-development with institutes of higher learning and Singapore infocomm enterprises, will contribute to building critical industry and manpower analytics capabilities in Singapore," said Mr Ronnie Tay, CEO, Infocomm Development Authority of Singapore.

"Today's announcement of the first High Performance Analytics Centre of Innovation in Singapore reinforces our commitment to work with the government to cultivate a world class business analytics ecosystem here," said Bill Lee, Managing Director of SAS Singapore. "Through efforts such as this new Centre of Innovation, SAS aspires to transform Singapore into a High Performance Analytics leader."

Recently, SAS has seen its customers change their approach to data with High Performance Analytics. With organisations today constantly seeking new and more effective ways to analyse data and make decisions based on huge volumes of data, SAS, together with the support of IDA, will help companies reap significant business benefits as they gain insights from data in real time.

The High Performance Analytics Centre of Innovation was announced at The Business Intelligence & Analytics Forum, an event taking place today at which business users, experts and industry leaders meet to exchange knowledge and experience on business intelligence and analytics.

Tuesday, July 24, 2012

One in Every Two Spam Messages Sent From Asia, Sophos Reveal

IT security and data protection firm Sophos has published the latest 'Dirty Dozen' of spam-relaying countries, covering the second quarter of 2012. While North America continued to reduce the proportion of spam it relayed by email, Asia increased its output and is now responsible for relaying 49.7% of all spam captured in SophosLabs’ global network of spam traps.

Despite only 5.3% of the world’s internet users reportedly living in India*, the country topped the list by a significant margin and was accountable for 11.4% of the world’s spam seen throughout April, May and June.

The US dropped from the top spot of spam-relaying countries to second place in Q1, and has now moved down to fourth place behind India, Italy and South Korea; while the UK has managed to remain out of the top twelve spam-relaying countries for the last four consecutive quarters, having last appeared in April - June 2011.

The top 12 spam-relaying countries for April to June 2012 are as follows:

  1. India -11.4%
  2. Italy - 7%
  3. South Korea - 6.7%
  4. USA - 6.2%
  5. Vietnam - 5.8%
  6. Brazil - 4.4%
  7. Pakistan - 3.7%
  8. China - 3.2%
  9. France - 3.1%
  10. Russia - 2.9%
  11. Poland - 2.7%
  12. Taiwan - 2.6%
  13. Other - 40.3%

“Spam emails make up an average of 45-50% of corporate email - that is one unwanted, unsolicited message for every important communication!” said Graham Cluley, senior technology consultant at Sophos. “We all pay the price: our email systems have to process and deliver the message, and our own time is wasted dealing with the spam email once it is in our inbox.”

Sophos recommends that organisations and ISPs implement technology and follow best practice to ensure that malicious emails are not reaching inboxes.

Asia increased its level of spam output, and the continent is now responsible for almost half of the world’s spam. Europe is responsible for about a quarter, while North America produced nearly 9%.

Top spam relaying continents for April-June 2012 are as follows:

  1. Asia - 49.7%
  2. Europe - 26.4%
  3. South America - 11.2%
  4. North America - 8.6%
  5. Africa - 3.6%
  6. Other - 0.5%

“The chief driver for Asia’s dominance in the spam charts is the sheer number of compromised computers in the continent,” explained Cluley. “Malicious hackers hijack poorly-protected computers, and command them - without their owners realising - to send out unwanted money-making messages and malicious links. Everyone has a responsibility to ensure that their PC or Mac is properly defended against such attacks. If they take no care over their computers they’re simply adding to the world’s spam problem.”

For more advice on how to combat spam, visit:

Symantec Advances Mobile Productivity with New Android and iOS Protection Capabilities

Building on its success of facilitating mobility initiatives for enterprise customers, Symantec Corp. announced significant mobile portfolio updates to enable secure mobile email deployments, mobile application initiatives and Bring Your Own Device programs. With these updates, Symantec now offers the most comprehensive enterprise-grade platform with enhanced capabilities in device management, application management and threat protection.

The updates include the following products and new capabilities:

  • New Symantec Mobile Security for Android is now available, bringing award-winning application analysis and threat detection technology to enterprise Android deployments
  • New Symantec Mobile Management for Configuration Manager is now available, marking the complete integration of technology from the Odyssey Software acquisition
  • Symantec Mobile Management now provides a secure email solution for Android devices with NitroDesk TouchDown integration
  • Symantec Mobile Management now provides native enterprise-grade management for Windows 7 Phone platform, complementing existing support for Android and iOS
  • Nukona App Center from Symantec now protects data on iOS devices with FIPS 140-2 certified encryption
  • Symantec PGP Viewer for Android now extends email encryption from the popular PGP Universal Server to Android devices

“With the increasing number of mobile subscribers in Malaysia and with more people using their personal devices for business, organisations are looking for capabilities to manage the influx of mobile devices and deal with the evolving nature of mobile applications and data,” said, Alex Ong, country director of Symantec Malaysia. “Symantec is providing an agile and cost effective platform to enable CIOs to achieve their mobile vision with the recent additions to our portfolio of mobile device management and application/data management solutions.”

Alex Ong, country director of Symantec Malaysia

He added, “Symantec’s mission is to secure people and information through identity, protection and context, and our broad approach to mobile security and management is a key extension of protection for all of our customers. By providing mobile security and management for smart devices, we’re making it easier for enterprises to allow their employees to use their device of choice without putting corporate data at risk.”

Symantec Mobile Security for Android

According to Symantec’s State of Mobility Survey , 67 percent of companies are concerned with malware attacks spreading from mobile devices to internal networks. In addition, Symantec’s latest Internet Security Threat Report highlighted that mobile vulnerabilities increased by 93 percent in 2011 and that threats targeting the Android operating system are on the rise.

To protect corporate-connected Android devices from app and Internet borne threats, Symantec today announced general availability of Symantec Mobile Security for Android. Mobile Security for Android leverages Symantec’s proprietary technology that monitors and analyzes millions of android apps available on appstores around the world. Supported by Symantec’s unparalleled Global Intelligence Network, Mobile Security for Android utilizes Symantec’s anti-malware detection technology from Norton Mobile Security, already protecting millions of Android devices.

Monday, July 23, 2012

IBM: CEOs Willing To Adopt More Open Culture

Refer to Malaysia Technology News, where the the Global CEO Study 2012 found that CEOs are willing to adopt more open economy in their organisations.

Generally, CEOs in ASEAN countries identified the followings as the most important external forces that will impact their businesses.

  • People skills
  • Market factors
  • Technology factors

Internally, CEOs feel that human capital is the no.1 factor in sustaining a business for continuous growth, while customer relationships comes in second and product innovations settles for third place.

Therefore, it is essential that CEOs create more economic value of their businesses by focusing on the following three domains of activities.

1.) Empowering employees through values

2.) Engaging customers as individuals

3.) Amplifying innovation with partnerships

In terms of Empowering employees, it is concluded that organisations should adopt a more open and connected culture whereby employees must adopt characteristics of 1.) being collaborative, 2.) being more communicative, 3.) being more creative and 4.) being more flexible.

Many years ago, business guru Jack Welch (ex-CEO of General Electric) lectures in his book 'Winning' that the biggest dirty little secret in business is about being candor. Period.

"When you've got candor-and you'll never completely get it, mind you - everything just operates faster and better".

Mr. Welch has the opinion that being candid is about expressing oneself with frankness, to communicate straightforwardly or put forth ideas looking to simulate real debate - people just don't open up and usually tends to withhold comments or criticism - a bad culture for organisations (Welch thinks that the lack of candor is absolutely damaging for organisations).

There are three ways how candor leads to winning.

1.) Candor gets more people in the conversation.

2.) Candor generates speed by getting more people to become 'uneasy'.

3.) Candor cuts costs such as elimination of meaningless meetings and balance sheet reports that confirm what everyone already knows.

Welch thinks that it is hard to push for the culture of candor, because it is going against human nature and time-consuming, however, it can and should be done.

"To get candor, you reward it, praise it, and talk about it. You make public heroes out of people who demonstrate it. Most of all, you yourself demonstrate it in an exuberant and even exaggerated way - even when you're not the boss."

Welch opines in his book that being candid may land one into trouble and that's a risk for one to decide - candid comments will definitely freak people out. Nevertheless, candor is that dirty little secret and it can be done.

Go read the book.

Full study findings and case studies, please visit:

More about trends.

Yahoo Has 700 million Unique Monthly Visitors

According to Yahoo! Co-Founder David Filo, the whole of Yahoo's ecosystem has over 700 million unique monthly visitors.

David Filo revealed this while commenting on the appointment of Marissa Mayer as the new President and CEO and Member of the Board of Directors effective 17 Jul 2012.

Friday, July 20, 2012

Oracle Unveils StorageTek SL150 Modular Tape Library

Oracle Corporation (NASDAQ: ORCL), the world's leading IT solution provider, Oracle announces the Oracle’s StorageTek SL150 Modular Tape Library, the lowest cost, scalable tape library on the market.

According to Oracle’s Director of Storage Sales, Japan and APAC, Systems Division, Amit Malhotra that StorageTek SL150 Modular Tape Library is an ideal archive and data protection solution for midsize and growing businesses.

“It can scale from 30 to 300 slots and up to 900 TB of capacity(1), giving customers ample room to grow in a single tape library and significantly reducing service, installation and capital expenditure costs.”

“Oracle’s StorageTek SL150 Modular Tape Library delivers the capacity they need today and the headroom to grow with their businesses in the future.”

StorageTek SL150 Modular Tape Library

Highlights on the StorageTek SL150 Modular Tape Library: -

i) Offers substantial space savings and can offer 40 percent higher density than competitive products.

ii) Can be deployed and expanded at up to 75 percent lower acquisition cost than comparable midrange solutions.

iii) It is easy-to-use and offers simple, streamlined management via an elegant, intuitive graphical user interface built on Oracle Fusion Middleware and Oracle Linux. Users can easily view and navigate drive, library and media information without dealing with cumbersome file structure drill-downs as in other solutions.

iv) Can be installed in as little as 30 minutes and capacity can be added quickly using the library’s USB-based auto-discovery system to find new expansion modules.

v) It also supports a wide range of open systems environments. Operating systems and platforms include Oracle Solaris and Oracle Linux, Oracle Exadata Database Machine, Oracle Database Appliance, Oracle’s SPARC and Sun x86 servers, and Oracle’s Sun Storage. It extends Oracle’s leadership in providing an integrated data protection and archive solution which includes Oracle 11g Recovery Manager, Oracle Secure Backup, Oracle StorageTek Tape Analytics, Oracle’s StorageTek Automated Cartridge System Library Software (ACSLS) and Oracle’s Sun Storage Archive Manager software.

“The target user for the new SL150 is, above all, looking for just a handful of things, headed by simplicity, scalability and reliability,” says Mark Peters, Senior Analyst at Enterprise Strategy Group. “The unique engineering of the SL150 is beguilingly straightforward, yet has ample capabilities for its intended users, who will no doubt be pleased that this junior thoroughbred comes from the proven Oracle StorageTek stable.”

“Oracle’s StorageTek SL150 Modular Tape Library focuses on simplicity of management and scalability make it ideal for the growing businesses,” ends Amit.

Thursday, July 19, 2012

Fujitsu Concept Stores Infuses Art of ‘Takumi’ in Digital Living

Fujitsu, the No.1 Global Windows-based Tablet PC Vendor (Quarterly PC Tracker Q1 2012, by unit shipments), announces the launch of a series of retail concept stores in Malaysia with the opening of their first Fujitsu Concept Store in Digital Mall, Petaling Jaya.

This store was inaugurated by Ms Yap Hui Hui, Country Manager, Fujitsu PC Asia Pacific Ltd, and showcases the entire range of Fujitsu’s collection from notebooks to their monitors and various other accessories, serving as a gateway to the world of Fujitsu’s products and services.

“In line with Fujitsu’s growing success in Malaysia, we are evolving ourselves into a lifestyle retail environment to serve our customers more effectively.”

“The Fujitsu Concept Store spearheads our strategy to drive growth in Malaysia by showcasing the range of Fujitsu’s end-user products in its full competitive and complimentary form. The Futjisu concept store promises to cater to all of our enthusiasts’ varied needs of gaming, multimedia, business and leisure,” stated Ms. Yap.

“Our concept store is designed to give customers the opportunity to have hands-on experience with the products to try for themselves to find out what best suits their needs,” says Ms. Yap, adding that the plan is to open a total of 3 Concept stores in Malaysia by end of 2012.

She adds, “The 1st Fujitsu concept store’s location in Digital Mall makes it a popular destination for consumers wanting options to fulfil their ICT, digital life requirements.”

As a one stop destination for Fujitsu’s products, the Fujitsu Concept Store provides customers with an opportunity to experience a more intimate ‘digital gadgets’ shopping extravaganza which is laid back and fulfilling. Infused with the Takumi concept, the store stays true to the brand’s original core of providing computing technology resonating throughout the products offered.

In line with Fujitsu’s commitment to enhance its product portfolio leveraging the latest in technology, the store features the entire range of Fujitsu’s products available in Malaysia.

The opening of the store is celebrated with a promotion - free products with purchases of the Fujitsu Lifebook LH531. First one hundred customers to purchase the notebook will receive a Fujitsu 500GB External Hard Disk worth RM229 and an original Fujitsu backpack.

The Fujitsu Concept Store will be open seven days a week from 11am to 9pm.

Symantec Survey Reveals Digital Information Costs Businesses US$1.1Trillion Globally

Symantec Corp. (Nasdaq: SYMC) announced that information costs businesses worldwide US$1.1 trillion annually, according to its first ever 2012 State of Information Survey. From confidential customer information, to intellectual property, to financial transactions, organisations possess massive amounts of information that not only enable them to be competitive and efficient – but also stay in business. In fact, the Malaysia findings of the survey revealed that digital information makes up 50 percent of an organisation’s total value.

“In Malaysia, the rapid growth of digital information is inevitable with several national initiatives of the government, including the Digital Malaysia programme which aims to advance our country towards a developed digital economy by 2020,” said Alex Ong, country director of Symantec Malaysia. “While organisations in the digital economy could leverage on the information they generate every day to better serve customers and increase productivity, the same information can be a major liability if not properly protected and managed.”

Ong added, “Organisations in Malaysia that use and manage their information effectively will have a huge competitive advantage over those who cannot, and in some cases it can be the difference between success and failure. Successful companies will find ways to more effectively protect their information and unleash the productivity it can bring.”

(L-R )Alex Ong ,
 Country Director for Symantec Malaysia 
and Nigel Tan, 
Principal Consultant for Symantec Asia South Region

According to Nigel Tan, Symantec’s principal consultant for Asia South Region, the survey found that while large enterprises and small and medium businesses (SMBs) in Malaysia place a high value on business information, they still struggle to protect the information effectively. “Low storage utilisation rates, duplication of data, and data loss are issues that businesses of all sizes in Malaysia are facing. They can address these challenges by taking proactive steps to build an information-centric IT model to protect their valuable information cost effectively,” said Tan.

Information is Skyrocketing and It’s Expensive

Businesses of all sizes are dealing with enormous amounts of data. The total size of information stored globally today by all businesses is 2.2 zettabytes. Small and medium businesses (SMBs) on average have 563 terabytes of data, compared with the average enterprise that has 100,000 terabytes. The survey also reveals that information is expected to grow 67 percent globally over the next year for enterprises and 178 percent for SMBs.

On average, enterprises worldwide spend US$38 million annually on information, while SMBs spend US$332,000. However, the yearly cost per employee for SMBs is a lot higher at US$3,670, versus US$3,297 for enterprise. For example, a typical 50-employee small business spends US$183,500 on information management, whereas a typical large enterprise with 2,500 employees would spend US$8.2 million.

The Business Impact of Lost Information

The consequences of losing business information would be disastrous. “We would have to fold our operations for at least a couple of years before we’d come back again,” noted an IT manager at a large engineering firm when asked about the consequences of losing the enterprise’s information.

Respondents from Malaysia highlighted the impact of data loss to their business, including loss of customers (50 percent), damage to reputation and brand (45 percent), increased expenses (41 percent) and) decreased revenue (37 percent).

Protection Measures are Falling Short

With so much at stake, protecting information should be a top priority, yet businesses are still struggling. In the last year, 79 percent of businesses in Malaysia experienced some form of information loss for a variety of reasons, such as human error, hardware failure, security breach, or lost and stolen devices. In addition, 98 percent of businesses in Malaysia have had confidential information exposed outside of the company, and 46 percent have experienced compliance failures related to information. Another challenge is the amount of duplicate information businesses are storing – an average of 42 percent of data is duplicated. Storage utilisation is also low, at only 16 percent within the firewall and 10 percent outside.

All these risks and inefficiencies result in businesses spending more than necessary on storing and protecting their information. A key issue identified by 30 percent of businesses is information sprawl – the overwhelming growth of information that is unorganised, difficult to access and often duplicated elsewhere.

Businesses Need to Put the “I” Back in “IT”

To help businesses more effectively protect their information, Symantec has the following recommendations:

  • Focus on the information, not the device or data center: With BYOD (bring your own device) and cloud IT trends, information is no longer within the four walls of a company. Protection must focus on the information, not the device or data center.
  • Not all information is equal: Business must be able to separate useless data from valuable business information and protect it accordingly.
  • Be efficient: Deduplication and archiving help companies protect more, but store less to keep pace with exponential data growth.
  • Consistency is key: It is important to set consistent policies for information that can be enforced wherever it’s located… physical, virtual and cloud environments.
  • Stay agile: Plan for your future information needs by implementing a flexible infrastructure to support continued growth.

Groupon Malaysia and World Vision Malaysia Join Forces To Fight Hunger

Groupon Malaysia announced its support for 30-Hour Famine 2012 by World Vision Malaysia, an annual initiative to raise awareness and support for millions of undernourished children and their families.

“The Groupon Promise goes beyond just offering the best value deals. We believe in providing our subscribers with the best possible experience. To that end, we at Groupon Malaysia make strong efforts and constantly strive to harness the group buying trend in order to give our consumers an opportunity to contribute to a worthy cause and share the joy of bringing amazing life experiences to those in need too,” said Joel Neoh, Vice President and General Manager of Groupon Southeast Asia and India.

Commencing from 16 to 27 July 2012, the fund-raising campaign provides Malaysians with a platform and opportunity to come together and make a difference by contributing funds through a special ‘Donate RM10 for Nutritious Food for a Child and Family in Asia’ deal which can be accessible at

Full proceeds from the initiative will be donated to the World Vision 30-Hour Famine Fund to help provide for health, nutrition and development projects in countries including Malaysia, China, India, Mongolia, Myanmar, Vietnam as well as other communities impacted by natural disasters.

“Approximately 5 million children under the age of 5 are dying annually due to malnutrition, a plight which desperately needs the attention and support of the international community as well as concerned citizens from around the world,” said Liew Tong Ngan, Chief Executive Officer of World Vision Malaysia.

He further added since the introduction of 30-Hour Famine in Malaysia in 1997, World Vision Malaysia has successfully raised millions of ringgit from concerned Malaysians. He hopes that the collaboration with Groupon Malaysia will lead to even more support for the plight of malnourished children around the world.

“Through this venture with World Vision Malaysia, we hope to further demonstrate the potential power of Groupon. We aim to empower more communities and societies through the group buying phenomenon to serve, contribute and make a difference in the lives of those in need,” said Joel.

Themed ‘Hunger No More’, 30-Hour Famine 2012 will take place from 4 - 5 August 2012 throughout Malaysia culminating in a Famine Mega Countdown on 5 August at Stadium Malawati in Shah Alam, Selangor. At the Countdown, participants will gather to break their 30-Hour fast in an act of solidarity. Taiwanese singer, song writer and director Wang Lee Hom will also be making an official appearance in his capacity as World Vision Malaysia’s 15th Anniversary Ambassador.

To contribute to the 30-Hour Famine Fund through Groupon Malaysia’s ‘Donate RM10 for Nutritious Food for A Child and Family in Asia’ initiative, kindly visit

Wednesday, July 18, 2012 Launches Inaugural Traveller Confidence Index – a leading online travel accommodation site based in Asia offering rooms in over 60,000 properties worldwide, today announced the release of its inaugural index researching global travel trends. The Traveller Confidence Index (TCI) tracks leading indicators for travel propensity, spending confidence, and regional momentum to provide meaningful insights into the travel trends of both consumers and businesses from a demand perspective.

Commissioned by, and in partnership with independent market research firm VisionOne UK, the study surveyed about 15,000 travellers worldwide during the first quarter of 2012. The survey topics focused on respondents’ travel experiences, online booking behaviour, spending and propensity for future bookings.

“As a leader in the online travel accommodation industry, places our customers at the forefront, and focuses on understanding their different needs and wants. Our commitment towards customers has led to the development of this travel index, allowing us and our partners to better respond to the uniqueness of each region’s travellers,” said Andrew Pumphrey, Managing Director for

“The insights derived from the index allow us to develop effective go-to-market strategies, and offer tailored products and services that meets and exceeds the needs of our customers, ensuring they get the right room for their dream holiday, each and every time,” explained Clarence Lin, Brand Development Lead for The survey covered 29 major travel markets in the Americas, Europe, and the Asia-Pacific region including Japan and Korea, and Oceania.

Asia Leads Online Usage for Bookings; Cost Savings Rank Lower on Priorities

Asia had the highest proportion of respondents having gone online to book for leisure and business accommodation at 70.3%. This compares to a global average of 63.2%; Europe at 63.2%; and Latin America at 51.6%. Within Asia, China had the highest proportion of direct online bookings at 57.5% of respondents, followed closely by Singapore at 57.4% and India at 55% of respondents respectively.

Asian travellers were also the least sensitive to cost with only 29% of respondents in Asia citing cost savings as the key determinant influencing their online bookings. This compares to the global average of 34%; 30.3% in Latin America; and 39.3% in Europe.

Spending and room booking results also reveal a disparity in confidence mirroring the ongoing economic uncertainty in the European and US markets relative to Asia’s strength. Travellers in Asia lead spending with 65.5 index points versus 62.9 points in Latin America, 53.3 points in Europe, and 49.3 points in the US.

Singapore led the Asia-Pacific region for overseas leisure travel with a propensity index score of 67.9 points versus Malaysia at 48.3 points, China at 62.8 points, and a global average of 61.4 points.

Latin America Most Bullish for Expected Accommodation Bookings, Followed by Asia

Travellers from Latin America are the most bullish in terms of expected travel accommodation bookings in 2012, leading all other regions with 66.7 index points. This is followed closely by Asia at 61.4 index points, and Europe trailing a large gap at 55.9 index points. Latin America and Asia are the only two regions to surpass the global average of 60.8 index points. Latin America also leads in all travel categories surveyed, and specifically in domestic (in-country) and leisure travel propensity at 72.5 and 70.6 index points respectively. In contrast, domestic (in-country) and leisure travel propensity in Asia scored 64.7 and 64.6 index points respectively.

US and Europe Show Weakness in Business Travel

Business travellers from Europe and the US were the most pessimistic in terms of travel propensity with 51.8 and 49.8 index points respectively, against the global average of 57.1 index points. Asia and Latin America were ahead of the mean at 58.1 and 62.8 index points respectively.

Similarly, business travellers from Europe and the US expect to spend the least in 2012, with 53.1 and 49.3 index points respectively, against the global average of 62 points.

The compilation of the above data sets has been nominated from a comprehensive set of supplementary findings taken from the Traveller Confidence Index 2012. The initial release of the findings covers macro-view datasets and regional-specific comparisons. Market or in-country specific datasets will be available in subsequent releases from

About The Index

The Traveller Confidence Index was commissioned by and conducted by VisionOne UK, an independent market research firm.

About 15,000 participants worldwide contributed to the index findings, comprising more than 500 respondents from 29 major travel markets worldwide, including the Americas, Europe, the Asia-Pacific region, and Oceania. Respondents were aged 18 and older, and had used the internet at least once in the past 12 months to search for travel accommodation options. 25 response datasets were used for 2012.

The index is calculated via an assigned value on a scale from 0 to 100, with 100 being the most positive response, and 0 being the least positive response. 50 is the assigned value for neutral responses.

VisionOne UK is an award winning research firm and an accredited member of the UK Market Research Society (MRS) and MRS Company Partners. Vision One Research operates a quality management system and is bound by the rules and regulations of the UK's Market Research Society (MRS). In addition, Vision One is committed to meeting the requirements of:

  • UK Data Protection Act 1998
  • European Directive EU 95.46/E
  • ESOMAR (The World Association of Research Professionals)

Sophos Announces Record Breaking Year

IT security and data protection company Sophos announced audited results for the fiscal year ended March 31, 2012.

Key Highlights

  • Billings* of $402.9m, growth of 17 percent on prior year
  • Cash EBITDA* of $107.9m, growth of 14 percent on prior year
  • Cash generated from operations of $92.2m, growth of 21 percent on prior year
  • Positioned as a “Leader” in Gartner, Inc’s 2011 Magic Quadrant for Mobile Data Protection, 2011 Magic Quadrant for Endpoint Protection and 2012 Magic Quadrant for Unified Threat Management (UTM)
  • Acquired Astaro Software AG in July 2011 to strengthen network security and unified threat management (UTM) offerings
  • Acquired Dialogs Software GmbH in April 2012 to strengthen mobile device management offerings
"Sophos achieved record results for year ended March 31, 2012. In these turbulent economic times, we continue to innovate, invest and prosper,” said Steve Munford, CEO, Sophos.

Product advancements

Over the year, Sophos has made considerable advancements across mobile device management, mobile data protection, cloud encryption and UTM, while also strengthening its market-leading endpoint and data protection solutions – all components of complete security.

Sophos updated all key products, with the following major releases:
  • Endpoint Protection 10, which offers fully integrated patch assessment, comprehensive web protection and filtering, and integrated encryption
  • SafeGuard Enterprise 6, which offers the industry’s first enterprise cloud encryption capabilities; SafeGuard protects critical data in public, private and hybrid cloud environments
  • Sophos Mobile Control 2, which enriches mobile device management with a new reporting dashboard for compliance enforcement and an easy to use self-service portal
  • Sophos UTM, which extends UTM capabilities into the cloud and Sophos AP 50, which enables faster and more reliable wireless networking
  • Complete Security Suites, which combine key functions like endpoint, data and web and email protection, along with mobile device management and protection for Microsoft Exchange and SharePoint

Strategy and vision: complete security, without complexity

IT professionals choose Sophos because the company is leading the way with a different approach to IT security—“complete security, without complexity.” Sophos’ complete security strategy removes the challenges of multiple point products by combining UTM, endpoint, mobile and cloud protection, resulting in better protection, increased visibility, less complexity and better value. With an ever changing IT landscape, Sophos’ products provide protection across the network, servers, laptops, desktops, the cloud and even users’ personal mobile devices used for corporate business—protecting everywhere.

“IT security is becoming more and more complex, with new challenges like smartphones and tablets as well as cloud storage, an ever increasing array of security products to manage and new applications to monitor, as well as more devious malware and hackers. Unfortunately, IT teams and IT security budgets are not growing at the same rate—something has to give. Through complete security without complexity, we offer partners and customers a value proposition unmatched in the market, a single system for the organization that provides them with the ability to stay ahead of the threat,” continued Munford.

Tuesday, July 17, 2012

Blue Coat Closes Mobile App Security Gap

Blue Coat Systems, Inc., a market and technology leader of Web security and WAN optimization solutions, today introduced mobile application controls that close the security gap created by unsanctioned mobile applications on the corporate network. As employees increasingly bring their own mobile devices to work, the mobile app security gap has widened. With its mobile application controls, Blue Coat uniquely gives IT the ability to manage the use of unsanctioned applications and consistently enforce policies across all devices on the network.

The growth in bring your own device initiatives has driven an increase in mobile devices and unmanaged, untrusted applications on the corporate network. According to Forrester Research, Inc., 57 percent of employees chose and purchased their own smartphone without any direction or guidance from their company. According to mobile application measurement company Flurry, each smartphone has, on average, 65 mobile apps installed. With 350 million employees expected to use smartphones at work by 2016, the number of mobile applications using the corporate network will continue to skyrocket.

The increase in mobile devices on the corporate network creates two distinct risks that lead to undesired or unpredictable network impacts. First, it contributes to the growing problem of unsanctioned applications on the corporate network. Second, corporate policies cannot be consistently enforced across all devices.

Like web-based applications, the use of mobile applications is dramatically eroding IT control of the network. Unlike browser-based web applications, however, mobile applications and their corresponding operations are typically self-contained and fall outside the control of traditional web security solutions.

To prevent unauthorized or undesired use of the corporate network, Blue Coat mobile application controls uniquely extend to mobile applications the same granular operational controls the company provides for web-based applications. With these operational controls, businesses can set policies around specific functions within both web-based and mobile applications. This enables businesses to consistently enforce policy across all devices and allows them to regain control over the applications on their network.

For example, a business that wants to mitigate unintentional leaks of confidential or secure location information could set a policy for Twitter that prevents employees from sending tweets but allows full reading or monitoring access. Blue Coat mobile application controls extend that web-based application policy to the Twitter mobile application, allowing read-only access across all devices on the network.

“The growth of BYOD initiatives has created a situation where IT security managers are facing a deluge of untrusted, unmanaged devices and applications on the corporate network,” said Steve Daheb, chief marketing officer at Blue Coat Systems. “Blue Coat mobile application controls give administrators the ability, for the first time, to not only determine which applications are allowed on the network but also to what extent mobile device users are able to interact with those applications.”

The new mobile application controls are integrated into the Blue Coat® ProxySG® appliances and the Blue Coat Cloud Service. Blue Coat adds new applications and operations to its mobile application controls on a monthly basis to continually enhance the value delivered to customers and ensure they have the most relevant controls to manage the applications on their network. The mobile application controls are automatically updated through the Blue Coat WebPulse™ collaborative defense and immediately available to customers with current support contracts. View a full list of supported mobile applications here.

Groupon Malaysia Expands Mobile Offerings With Android App

Groupon Malaysia announced the long awaited launch of its official Groupon mobile application for Android smartphones. Available for download from the Android Market, the nation’s leading online group buying destination now expands its mobile offerings to allow even more consumers to enjoy daily flash sale deals from the convenience of their Android device.

Malaysia joins a growing number of Groupon markets worldwide to offer mobile application capabilities via Android devices including Poland, Belgium, Ireland, Australia, New Zealand, Hong Kong, Singapore, Netherlands, Brazil, Germany, France, Italy, United Kingdom, Norway, Finland, Canada, France, South Africa, Austria, Israel, Turkey, Portugal, the Philippines, Colombia, Mexico, Greece, Peru and regions across Spain and North America.

“The Groupon Android app makes it even easier for customers to get their daily Groupon fix. The app allows shoppers to buy, manage and redeem Groupons on the go, bringing the best of their city directly to their pockets no matter where they are,” said Joel Neoh, Vice President and General Manager of Groupon Southeast Asia and India.

Offering a seamless buying and redemption process for consumers and merchants, the new Groupon Android app also allows consumers to browse and purchase daily deals from across Malaysia while on the go. Consumers can also sign up for and access their Groupon User Account data, locate Groupons in real-time through a GPS feature, pay for purchased deals via PayPal and redeem Groupons directly from their mobile device screen.

Groupon Malaysia recently also introduced a new shopping tab feature on its microsite to further assist consumers in locating selective, affordable and quality deals. The new feature forms an intelligent network of products and services from various categories such as home & garden, electronics, fashion, online shops, toys, accessories, groceries, chemist and many more to provide consumers with a bird’s eye view of its range of offerings.

Groupon Merchant Android App Groupon Consumer Android App

The new shopping tab feature also highlights some of the best sellers available and further provides consumers with an overview of deals that are expiring soon – allowing them to quickly make a purchase and enjoy greater levels of accessibility and convenience while on the move.

“At Groupon Malaysia we are committed to ensuring that our customers enjoy the best possible experience. From quality products or service to the convenience in which they are able to purchase and partake in their chosen Groupon, we establish strong parameters to ensure that their demands are met. With the new shopping tab feature, our customers can now optimize their time to seek and enjoy the deals that they want more efficiently,” said Joel.

To download the Groupon mobile app from the Android Market, kindly log on to to download the app. Additionally, customers who wish to enjoy the new shopping tab feature are invited to visit

Yahoo Hires Google's Marissa Mayer as CEO

I certainly never expected this.

Anyway, it is happening.

According to Reuter, Marissa Mayer will become the CEO.

Mayer graduated from Stanford with degree in Symbolism (Symbolic Systems), was Google's earliest employee and the few female engineers. She was instrumental in Google's search user intuitiveness architectural design.

Sunday, July 15, 2012

BMW Innovation Days: BMW ConnectedDrive

BMW ConnectedDrive has been setting the pace in the field of automotive connectivity for many years now, and is renowned for forward-looking in-car concepts and technologies that maximise customer benefit. The new functions mark another milestone in the BMW ConnectedDrive success story and once again demonstrate how the BMW Group is striving to retain its status as the leading innovator in this area.

The new generation of the BMW Navigation system Professional boasts more powerful and impressive performance than ever, featuring a higher performance system run by 1.3 GHz processor and dedicated 3D graphics chip. The new sophisticated state-of-the-art design with atmospheric lighting and 3D caters for improvement in terms of visual. Optimised control concept with smooth scrolling and browsing caters for more intuitive experience and the new spatial capabilities for menu levels allow tactile feedback for the user accompanied by direct visual confirmation of their interactions with the vehicle.

Route Guidance System
  • Improved route guidance system.
  • Split-screen capability in central information display for easier orientation when selecting destination.
  • Interactive map enables drivers to zoom, tilt and even alter the map scale and direction.
  • Automated High Guiding function as the driver draws closer to the destination, displaying detailed navigation information, and a birds’-eye view of immediate area.
  • “3D City Models” view mode providing a realistic visualisation of surrounding streets and buildings, provided the city is within the vehicle database.
  • PIE Menu providing quick access to a wide range of actions that can be used on the map.
  • Real Time Traffic Information (RTTI) function that factors in real-time traffic situations for both route guidance and calculation of arrival time.
  • Extended toolbar that allows for customizable access to functions and map content.

Multimedia and Office Functions
  • A host of Office and Multimedia functions, including calendar and contact information list.
  • Calendar and contact information from two smartphones may be integrated into the vehicle.
  • 40 GB of Multimedia hard disk space.
Multifunctional Instrument Cluster Display
  • High-quality and comprehensive visualisation of driving-related information by merging both hardware and graphical software displays.
  • COMFORT, SPORT and ECO PRO driving experience modes have their own colour schemes and display instrumentation.
  • Instrument readouts adapt to specific driving modes to ensure drivers benefit from an instrument cluster display that is in tune with current driving situation.
  • Instrument cluster provides additional personalised information such as status and function displays, Check / Control messages and navigation instructions.

iDRIVE Controller Touch
  • 45mm multi-touch surface makes certain in-vehicle functions more intuitive, faster and easier to use.
  • Multi-gesture controls: Two-finger pinch gesture to alter the scale of the navigation map.
  • Ergonomically positioned for easier reach, with entry, selection and confirmation performed suing the control knob’s rotate-and-press mechanism.
  • Handwriting recognition function enables characters to be entered with finger by writing on surface of the touchpad.

  • Brings high-speed mobile internet experience to the road.
  • Requires LTE-capable SIM card (4G). When LTE 4G is not available, adapter switches to UMTS / HSPA 3G or GSM 2G.
  • Hotspot adapter allows for multiple devices to be linked up simultaneously to be shared by all passengers.
  • Built in battery pack, allow for portable use that last for 30 minutes without external power supply.
  • USB power supply unit enables autonomous use without need for either vehicle or battery.
  • Built-in antennae improves reception and reduces radiation.
  • Hotspot fits into any BMW centre console with phone base plate so it can be easily retrofitted into older BMW vehicles.
Speech-Based Functions
  • Dictation function employs full speech recognition system to transcribe driver’s words.
  • Numerous voice commands / phrases that can control multiple in-vehicle functions.
  • Also recognizes and answers questions relevant to the vehicle’s in-built functions such as “Are there any traffic?” or “How do I adjust the sound.”
  • Dictation function allows users to compose short text-based messages or e-mails with speech alone.
  • Easy-to-use editing tools allow users to conveniently put the final touches in their e-mails and text messages.
  • Recognizes up to six languages at present.
  • Voice memo feature allows drivers to make direct voice recordings of up to two minutes in length and send away by e-mail if required
  • Memos can be stored on USB stick when drivers leave the vehicle.
SDK for Third Party Apps
  • Allows for features such as web radio, Google Local Search and even Facebook to be used safely and easily in the vehicle.
  • Facilitates the integration of third-party apps into vehicle’s native control and display.
  • SDK contains guidelines and tools to help third-party app provides to safely develop vehicle-adapted versions of their apps.
  • In addition to iPhone compatibility, from July 2013, Android platform phones will also benefit from the application-based integration.

Disable Windows Sidebar and Gadgets NOW on Vista and Windows 7

Users of Windows Vista and Windows 7 have been advised to completely disable their Windows Sidebar and Gadgets, in response to what appears to be a serious security risk. The Windows Sidebar is a vertical bar that can appear at the side of your desktop, containing mini-programs (known as gadgets) that can provide a number of functions such as a clock, the latest news headlines, weather report and so forth.

A security advisory issued by Microsoft's security team advises that vulnerabilities exist that could allow malicious code to be executed via the Windows Sidebar when running insecure Gadgets.

The warning comes ahead of a talk scheduled for Black Hat later this month by Mickey Shkatov and Toby Kohlenberg. Shkatov and Kohlenberg's talk, entitled "We have you by the gadgets", threatens to expose various attack vectors against gadgets, how malicious gadgets can be created, and the flaws they have found in published gadgets.

"We will be talking about our research into creating malicious gadgets, misappropriating legitimate gadgets and the sorts of flaws we have found in published gadgets."

According to Graham Clulely, Senior Technology Consultant at Sophos, “If the researchers have managed to find ways to exploit existing gadgets that's particularly worrying.

“Clearly Microsoft is worried about the security researchers' findings, and has issued a "Fix It Tool" which will protect Windows 7 and Vista users by entirely disabling the Windows Sidebar and Gadgets functionality.

“Yes, that's right. Microsoft hasn't issued a security patch to fix the vulnerability. They're suggesting you completely nuke your Windows Sidebar and Gadgets.

“Which is bad news if you found those sidebar gadgets useful. You better find a new way to tell what time it is, or catch the latest from your favourite RSS feeds.

“Sorry if it causes you any pain, but I would recommend you follow Microsoft's advice if you run Windows 7 or Vista and apply their "Fix It tool" as soon as possible. It may be a sledgehammer to crack a nut - but it's a nut that needs smashing, and fast.

Interestingly, Microsoft has dropped Gadgets from the upcoming Windows 8. In retrospect, that was probably a very good idea.”

Friday, July 13, 2012

Werebits Launches Digital Loyalty Card

The retail industry is experiencing a mini renaissance in the Malaysian scene according to Mr. Tan Hai Hsin, who is the MD of Retail Group Malaysia - a company specialises in providing retail research and shopping centre consultancy services to retailers, shopping centre developers and shopping centre managers in Malaysia and around the region.

Looking forward towards to nearer future, particularly these coming 6 months down to the end of 2012, it looks like things are shifting towards lower gear. Partly due to slowed down growth in China retail industry, the sanction on credit card approval towards the general public and higher interest rates for business loans implemented by Bank Negara Malaysia also contributed to the expected slow-down.

If we look around the communities in Klang Valley, we may be greeted by sights of frequent closure of shops or even empty shop houses which have been left vacant for a while.

Nevertheless, the economy is still kicking. Luxury cars like Mercedes Benz, BMW and etc are still selling very well. People are still queuing up at places like Fatty Crab, Bubble Tea house, Gloria Jeans' Coffee and visiting places like Wings Musicafe for both F & B and WiFi; yea can't they Facebook at home ?

Organic shops, bicycle shops and tea shops are booming in our community, people are getting more and more upbeat about living a better quality life.

There is also a strong taste for good interior design retail outlets which present consumers with cozy and not-stressful feeling; a good break from the busy tone of our daily lives.

Thus, Mr. Tan opined that in this scenario, either you are doing very well or doing quite badly, there is no in between. Successful retailers are the ones who are able to understand what today's consumers want and provide accordingly - it is about trends!

One of the popular retail trends these days is deployment of paper-based loyalty stamp cards where it goes like if you buy 10 coffees, you will get 1 free. Isn't it nice ? Why not ? I can always drink 1 more. After that, you get started all over again with a new cycle.

It is a great invention, I wonder who started it ? And a company called Werebits Sdn. Bhd. actually computerised it and sell it as ChopInk.

ChopInk supports iOS and Android platform. Retailers who signed up will just need to pay RM 48 per month to have all of it running. There is no specialised hardware required, all retailers need to do is to print out the QR Code from the system.

ChopInk saw this opportunity where there may be annoyingly too many paper-based loyalty stamp cards for an average consumer to carry and high chances are that they will be lost!

By using ChopInk, consumers get to earn every single point deserved while merchants get to maximise more sales.

Up to date, 18 brands and 40 outlets are using the system all over Malaysia, mostly in Klang valley and Penang. Werebits targets to sign-up 1000 outlets by end of 2012. Currently they are employing own sales team as well as some appointed channels for the task.

The system is leveraging on Amazon AWS cloud computing infrastructure (which ensures 99.9% uptime and scalability) and the team has invested RM 80,000 into the project.

The system also serves as backend social media and sales analytics platform for the retailers. It is secured using SSL technology and self-developed algorithm for abuse detection where retailer's HQs can reset the QR Code on real-time basis.

Through ChopInk, retailers are able to know who their regular customers are and maintain a repository of their contact information for use in future marketing campaigns and reward programs. Retailers can decide what and how much they want to give away for their reward program and how many loyalty stamps it will take for cusotmers to receive rewards. ChopInk also provides professional services.

During the launch, it was officiated by representatives from Wings Musicafe and Gloria Jeans' Coffee.

Lim Sin Khim, CEO of Wings Musicafe; Ho Heng Yew, Marketing Director Of Werebits Sdn Bhd; Teon Ooi, Co-founder of ChopInk; Aida Noryati Abdul Muti, Marketing Manager of Gloria Jean’s Coffees with Tan Hai Hsin, Managing Director of Retail Group Malaysia launching the ChopInk mobile app

It is very simple to use, just check out the web site.

Symantec Report Finds That More Than a Third of Global Targeted Attacks Are Aimed At SMBs

Symantec Corp. (Nasdaq: SYMC) announced the findings of its June 2012 Symantec Intelligence Report, which shows 36 percent of all targeted attacks (58 per day) during the last six months were directed at businesses with 250 or fewer employees. As reported in the recent ISTR, this figure was 18 percent at the end of December 2011.

During the first half of the year, the total number of daily targeted attacks continued to increase at a minimum rate of 24 percent with an average of 151 targeted attacks being blocked each day during May and June.

Large enterprises consisting of more than 2,500 employees are still receiving the greatest number of attacks, with an average 69 being blocked each day.

The Defense industry (a sub category of the Public Sector) has been the targeted industry of choice in the first half of the year, with an average of 7.3 attacks per day.

The Chemical/Pharmaceutical and Manufacturing sector maintain the number two and three spots. These targets have clearly received a smaller percentage of overall attention than in 2011, but the Chemical/Pharmaceutical sector is still hit by 1 in every 5 targeted attacks, while Manufacturing still accounts for almost 10% of all targeted attacks.

Other Report Highlights:

Spam: In June, the global ratio of spam in email traffic fell by 1.0 percentage point since May, to 66.8 percent (1 in 1.5 emails). This follows the continuing trend of global spam levels diminishing gradually since the latter part of 2011.

Phishing: In June, the global phishing rate increased by 0.04 percentage points, taking the global average rate to one in 467.6 emails (0.21 percent) that comprised some form of phishing attack.

E-mail-borne Threats: The global ratio of email-borne viruses in email traffic was one in 316.5 emails (0.31 percent) in June, an increase of 0.04 percentage points since May. In June, 27.4 percent of email-borne malware contained links to malicious Web sites, 1.2 percentage points lower than May.

Web-based Malware Threats: In June, Symantec Intelligence identified an average of 2,106 Web sites each day harboring malware and other potentially unwanted programs including spyware and adware; an decrease of 51.7 percent since May.

Endpoint Threats: The most frequently blocked malware for the last month was WS.Trojan.H . WS.Trojan.H is a generic, cloud-based, heuristic detection for files that possess characteristics of an as-yet unclassified threat.

Geographical Trends:

  • As the global spam rate decreased, Hungary was the most spammed geography in June, with a spam rate of 74.3 percent.
  • In the US, 66.4 percent of email was spam and 66.5 percent in Canada.
  • The spam level in the UK was 67.2 percent.
  • In the Netherlands, spam accounted for 68.9 percent of email traffic, 66.3 percent in Germany and 66.0 percent in Denmark.
  • In Australia 66.1 percent of email was blocked as spam percent in Australia, 65.9 percent in Hong Kong and 65.8 percent in Singapore, compared with 63.4 percent in Japan.
  • Spam accounted for 66.8 percent of email traffic in South Africa and 71.0 percent in Brazil.

  • The Netherlands was the country most targeted in June, with one in 54.4 emails identified as phishing attacks.
  • Phishing levels for the US reached one in 1,261.5 and one in 332 for Canada.
  • In Germany phishing levels were one in 1,043.7, one in 478.2 in Denmark.
  • In Australia, phishing activity accounted for one in 708.2 emails and one in 1,182.9 in Hong Kong; for Japan it was one in 8,005.7 and one in 2,679 for Singapore.
  • In Brazil one in 713 emails was blocked as phishing. In South Africa it was 1 in 170.9 emails.

E-mail-borne Threats
  • The Netherlands was the geography with the highest ratio of malicious email activity in June, with one in 48.6 emails identified as malicious.
  • In the UK, one in 209.9 emails was identified as malicious, compared with South Africa, where one in 414.1 emails was blocked as malicious.
  • The virus rate for email-borne malware in the US was one in 570.2 and one in 271.3 in Canada.
  • In Germany virus activity reached one in 385.4 and one in 438.4 in Denmark.
  • In Australia, one in 598.3 emails was malicious. For Japan the rate was one in 2,372.8, compared with one in 862.7 in Singapore.
  • In Brazil, one in 403.8 emails contained malicious content.

Vertical Trends:
  • The Automotive sector was again the most spammed industry sector in June, with a spam rate of 69.7 percent; the spam rate for the Education sector was 68.2 percent.
  • The spam rate for the Chemical & Pharmaceutical sector was 66.8 percent, compared with 66.4 percent for IT Services, 66.0 percent for Retail, 67.2 percent for Public Sector and 66.2 percent for Finance.
  • The Public Sector remained the most targeted by phishing activity in June, with one in 113.9 emails comprising a phishing attack.
  • Phishing levels for the Chemical & Pharmaceutical sector reached one in 1,201.2 and one in 986.8 for the IT Services sector, one in 835.3 for Retail, one in 330.6 for Education, one in 247.5 for Finance, and one in 2,114.3 for the Automotive industry.
  • With one in 89.8 emails being blocked as malicious, the Public Sector remained the most targeted industry in June.
  • The virus rate for the Chemical & Pharmaceutical sector reached one in 402.1 and one in 502.1 for the IT Services sector; one in 522.0 for Retail, one in 219.8 for Education and one in 204.2 for Finance.
Market Trends:
  • The spam rate for small to medium-sized businesses (1-250) was 66.4 percent, compared with 66.9 percent for large enterprises (2500+).
  • Phishing attacks targeting small to medium-sized businesses accounted for one in 401.6 emails, compared with one in 402.9 for large enterprises.
  • Malicious email-borne attacks destined for small to medium-sized businesses accounted for one in 360.8 emails, compared with one in 269.0 for large enterprises.

The June Symantec Intelligence Report provides greater detail on all of the trends and figures noted above, as well as more detailed geographical and vertical trends.