Google Analytics

Search This Blog

Tuesday, December 31, 2013

McAfee Cyber security forecasts for 2014

Press release - Dec 30, 2013

Today, McAfee Labs released its annual 2014 Predictions Report, analyzing 2013 trends through its proprietary McAfee Global Threat Intelligence (GTI) service to forecast the threat landscape for 2014.

In the upcoming year, McAfee Labs expects to see the rapidly growing mobile platform draw the lion’s share of threat innovation, with ransomware expected to proliferate on mobile devices.

McAfee Labs also predicts that attacks using advanced evasion techniques will come of age, and social platforms will be used more aggressively to target the finances and personal information of consumers, and the intellectual property and trade secrets of business leaders.

Here are some of the main trends McAfee Labs foresees in 2014:
  • Mobile malware will be the driver of growth in both technical innovation and the volume of attacks in the overall malware “market” in 2014
  • Virtual currencies will fuel malicious ransomware attacks around the world
  • In the spy vs. spy world of cybercrime and cyber warfare, criminal gangs and state actors will deploy new stealth attacks that will be harder than ever to identify and stop
  • “Social attacks” will be ubiquitous by the end of 2014
  • New PC and server attacks will target vulnerabilities above and below the operating system
  • The evolving threat landscape will dictate adoption of big data security analytics to meet detection and performance requirements
  • Deployment of cloud-based corporate applications will create new attack surfaces that will be exploited by cybercriminals

Tuesday, December 24, 2013

Developers Updates Week 4 of Oct 2013

In the last updates series (Week 3 of Oct 2013), the most interesting update was the C++ compiler for Android by Intel.

For this updates series, the followings had emerged.
  • MathWorks - Dec 24, 2013 - Developing In-Vehicle Traffic Jam Alleviation Technology for Android Using Simulink
  • MSDN - Dec 20, 2013 - 500 more slots now available in the Kinect for Windows v2 Developer Preview Program
  • Press release - Dec 20, 2013 - GAME JAM 2013 Winners Attend Japan Game Development Research Tour
  • Press release - Dec 20, 2013 - Oracle SQL Developer 4.0 Enhances Support for Oracle Database 12c
  • Press release - Dec 13, 2013 - Juniper Unveils Junos® Pulse AppConnect SDK
  • Caltech - Oct 22, 2013 - DNA molecules as a computing substrate to solve a hard math problem.
  • Intel - Oct 22, 2013 - Intel® XDK New HTML5 Cross-platform Toolkit
  • Press release - Oct 22, 2013- Intel Capital Unveils $65 Million in New Investments at 14th Annual Intel Capital Global Summit
  • Press release - Oct 17, 2013 - Ericsson Application Awards 2014
  • Press release - Oct 18, 2013 - Huawei Launches ‘MBB Insider Online' Platform for Next-Gen Mobile App Developers

Where milliseconds matter: low latency networks going mainstream

By Henry Bohannon, Senior Director, Head of Ethernet Product Management, Tata Communications

While the standard communications network is designed to offer a competitive cost structure, low latency networks have turned this model upside down: speed takes priority over cost.

Financial firms used to be the sole users of low latency networks. Financial firms generate revenue from the purpose built, low latency networks through arbitrage created between markets with electronic trading. Low latency links have been designed to provide the fastest possible speeds between electronic trading locations, allowing execution of trades between exchanges in milliseconds. Financial firms take advantage of the difference in the buy and sell price on different exchanges. The difference in the buy and sell price is extremely small, but by trading in large volumes, the firms can earn millions of dollars every day.

While firms in the banking, financial services and insurance industry segments are the primary users of low latency applications, other companies are now ready to pay a premium for the improved performance. This improved performance, between specific locations, delivers benefits that outweigh the higher cost. Low latency networks are of interest to pharmaceutical companies, IT organisations, cloud service providers and content delivery specialists. These are companies which are running business-critical applications or revenue critical applications which will not work optimally on networks with high latencies. It is no longer a simple binary question of an application working or not, but an investment in the network latency performance can deliver direct business benefits through improved application performance.

Computer Security Updates Week 4 of Dec 2013

Refer to Computer Security Updates Week 2 of Dec 2013; the biggest news was a report by USA Today that hackers stole almost 1.6 million login credentials and 320,000 e-mail credentials.

For this week / last week, here are / were the biggest news.
  • Press release - Dec 24, 2013 - Accor Hotels Chooses McAfee Next-Gen Firewall for Secure Connections Worldwide
  • Press release- Dec 20, 2013 - Prolexic Opens North Pole DDoS Scrubbing Center.
  • USA Today - Dec 18, 2013 - Tech leaders dialogued with US President on NSA surveillance issues.
  • Press release, Dec 13, 2013 - Kaspersky Academy is calling for innovations
  • Press release, Dec 12, 2013 - Fake Twitter users on the rise; Cost becomes more affordable
  • Press release - Dec 10, 2013 - Kaspersky Internet Security shows great performance in AV- Comparatives testing
  • Dec 10, 2013 - Symantec: Creepware analysis
  • Dec 8, 2013 - Trend Micro 2014 predictions

Monday, December 23, 2013

Kaspersky Lab makes its forecasts for the coming year - 2014

By Kaspersky Lab.

Kaspersky Lab’s experts have made their predictions about 2014. Not surprisingly, much of what they have seen in their crystal balls is connected to the fall-out from Edward Snowden’s revelations.

1.)End user forecast

Cybercriminals will target...

1.1) your privacy

After the Snowden scandal of 2013, people are determined to keep their private life under wraps despite the attentions of intelligence agencies around the world. That means protecting the information stored on their computers and devices and ensuring their online behavior remains confidential. This will lead to greater popularity for VPN services and Tor-anonymizers as well as increased demand for local encryption tools.

1.2)your money

In 2014, Kaspersky Lab’s experts expect cybercriminals to continue developing tools to steal cash – directly or indirectly. To plunder pockets directly, the fraudsters will further refine their tools designed to access the bank accounts of mobile device owners (mobile phishing, banking Trojans). Mobile botnets will be bought and sold and will also be used to distribute malicious attachments on behalf of third parties. To support indirect thefts, it is likely that we will see more sophisticated versions of the Trojans which encrypt the data on mobile devices, preventing access to photos, contacts and correspondence until a decryption fee is handed over. Android-based smartphones will no doubt be the first to be targeted.

1.3) your Bitcoins

In 2014 Kaspersky Lab’s experts expect considerable growth in the number of attacks targeting Bitcoin users’ wallets, Bitcoin pools and stock exchanges. Find out how to keep your Bitcoins safe here.

Groupon Malaysia Raises RM 271,125 for Typhoon Haiyan Victims

Press release - KUALA LUMPUR, 17 Dec, 2013

Groupon Malaysia has recently presented a cheque worth RM271,125 to the Malaysian Red Crescent Society (MRC) in aid of the victims of Typhoon Haiyan in the Phillippines.

Present at the cheque presentation ceremony were Datuk Haji Dr. Noordin bin Ab. Razak, National Vice Chairman & Secretary General of Malaysian Red Crescent, Rafiq Razali, Country Head of Groupon Malaysia, Yeoh Chen Chow, Regional Operations Director of Groupon APAC and Jon Wild, Head of Marketing of Groupon Asia Pacific.

Friday, December 20, 2013

Malaysian Search: Google's Top Searches of 2013

Press release - Kuala Lumpur, December 17, 2013

Today, Google announced its annual Year End Zeitgeist, a look at 2013 through the collective eyes of the world on the web, offering a unique perspective on the year's major events and hottest trends based on searches conducted in Malaysia.

Malaysia’s Trending Queries of 201:
  • Lahad Datu
  • SKMM
  • Keputusan PRU13
  • Setia Hujung Nyawa
  • Gwiyomi
  • Teduhan Kasih
  • Malindo Air
  • WeChat
  • The Conjuring
  • Cinta Jannah


Thursday, December 19, 2013

Fantasy Premier League Best Kept Secret

By FanXT

When someone mentions a fantasy commissioner game, you’d probably think of American sports - English Premier League (EPL) may not be the first to pop up on your mind. Not to worry, you’re not the only one. Fantasy Premier League Commissioner is a relative newcomer in the scene, breaking out of American markets to cater to the large and still fast-growing user base in fantasy football (soccer) games. Yet, it had already garnered quite a following, with positive reviews from EPL Talk and, just to mention a few.

In fact, fantasy EPL managers are really missing out if they aren’t already on the game. The commissioner system offers highly customizable features not found in any other fantasy game for EPL:

1. A unique league URL and customized interface

The commissioner system offers each league its own subdomain, so users can easily share their league details, in addition to having a sense of ownership of the league. They can also enhance their league with unique logo and banner, colour theme and site background.

2. Adjust league settings

Users are given leeway to set the transfer limits and overall budget to suit their members’ tastes and experience levels, even decide upon the start of the league.

ICT Happenings Week 3 of Dec 2013

News for Week 5 of Oct 2013; nothing spectacular.

For this week / last week, here are / were the biggest news.
  • Press release - Dec 20, 2013 -SonicGear introduces the Pandora series.
  • Press release - Dec 19, 2013 - Fujitsu Unveils Brand New Leasing Programme for Businesses
  • Press release - Dec 19, 2013 - Royal Air Force Museum introduces German Dornier Do 17
  • Press release - Dec 19, 2013 - New Nokia Lumia 525 will be in stores tomorrow (20 Dec 2013)
  • Press release - Dec 18, 2013 - WFT Cloud Surpasses a Key Milestone of over 300 Customers using its SAP Cloud Hosting Platform
  • Press release - Dec 18, 2013 - Aspect Software Announces Zipwire Contact Centre Solution
  • Press release - Dec 18, 2013 - Symantec releases Storage Foundation 6.1
  • Press release - Dec 16, 2013 - Oracle Launches Oracle Exadata Database Machine X4
  • Press release - Dec. 16, 2013 - SAP Innovates With New Release of SAP Business ByDesign® Solution
  • USA Today - Dec 14, 2013 - China soft landed rover on the moon
  • Press release - Dec 13, 2013 - Exabytes 20Mbps Dedicated Server
  • Press release - Dec 12, 2013 - Virus Wu Named as Electro-Voice Ambassador
  • Press release - Dec 12, 2013 - SMEs Usher in New Era of Business Productivity in Singapore
  • Press release - Dec 10, 2013 - Viber Launches ‘Viber Out’ Worldwide
  • Press release - Dec 9, 2013 - ADCA to Offer Multiple City-Connectivity 
  • Press release - Dec 9, 2013 - Lazada Ends 2013 with the Online Revolution Blitz and a Brand New Look.
  • Press release - IBM - Dec 6, 2013 - Made in IBM Labs: Helping Clients Securely and Reliably Migrate Cloud Data.
  • Press release - Dec 6, 2013 - MOLPay as payment gateway for .my domain mapping platform
  • Press release - Dec 5, 2013 - travelmob launches iOS app to further expand its reach in the Asia Pacific region
  • Press release - Dec 5, 2013 - Silver Peak Unveils Dynamic Path Control to Optimize Hybrid WANs
  • Press release - Dec 5, 2013 - Tata Comm. named Best Wholesale Carrier at World Communications Awards 2013.

Wednesday, December 11, 2013

Sophos Threat Report 2014

Press release - Dec 11, 2013

Sophos today released its latest Security Threat Report. The report outlines trends for 2013 and prediction for 2014. For year 2013, cyber criminals continued the theme of professionalization of their ‘industry’, offering easy to buy and use services that amplified the scale of cyber crime to never before seen levels.

In the comprehensive reports, please pay attention to a few key highlights of 2013:

1.) Malware evovled in 2013

2.) Botnets Grew in size and stealth

3.) Android Malware mutated and got smarter

4.) Linux attracted criminals - large numbers of malicious PHP scripts that inherited features of botnet were detected

5.) Many small attacks on Mac OS X platform

6.) Web-based malware became more sophisticated, diverse and hidden

7.) APTs on Financial industry

Symantec: Mobile Adware and Malware Trends

By Symantec.

According to a research paper by Symantec, here are the latest mobile Adware and Malware trends:
  • Percentage of “madware” (overly-aggressive mobile adware) on Google Play steadily increasing – Twenty-three percent of all apps in the Google Play store this year contained aggressive ad libraries, compared to 15 percent in 2012.
  • The aggressive actions “madware” (overly-aggressive mobile adware) can take – Two-thirds of madware apps collect device information, such as its IMEI number or phone producer and model. Additionally, a third of madware apps display ads in the notification bar, which can annoy users.
  • Android malware continues to grow exponentially - Between June 2012 and June 2013, the number of known malware families increased by 69 percent, and known malware samples increased nearly four times.

Tuesday, December 10, 2013

Avnet Malaysia Outlines Its SAP® Offerings Strategy

Press release - Dec 10, 2013

Avnet Malaysia today announces its SAP business strategy for Malaysian market. Here is a quick summary of the announcement.

1. New alliance with SAP is aligned with the company’s local strategy to expand its middleware products portfolio targeting financial services industry (FSI) and mid-range small and medium enterprise (SME) commercial markets in the country. Currently, Avnet is involved in several SAP-related IT implementation projects in the Malaysian government sector.

GM of Avnet Technology Solutions, Malaysia

2. This move is expected to strategically expand SAP’s existing database and technology solutions customer base in Malaysia. - Avnet Malaysia’s strategy is to fill this gap by offering SAP analytical and converged infrastructure capabilities especially targeting the underserved market of unconventional and non-SAP-based enterprise software customers via channel partners.

3. The partnership with SAP is also timely for Avnet to embark on the new opportunities that presents on Malaysia's GST policy implementation.

Hence, basically what this means is Avnet is now carrying SAP as its products and services offering - and the potential is huge.

On Aug 2013, Avnet  signed up as distributor for Red Hat.


Kaspersky 2013 Cyber Security Overview

Press release - Kaspersky - Dec 5, 2013

Worldwide landscape trends recorded:
  • Exposure of cyber-espionage related activities involving government agencies
  • New “old” cyber-espionage campaigns live on - Red October, NetTraveler, IceFog and MiniDuke
  • Bitcoins used heavily for cyber-espionage and cyber-terrorism activities

Enterprise trends recorded:
  • Spyware-led attacks related to various governments were revealed
  • Most cybercriminal incidents were aimed at stealing information
  • Attacks on contractors were identified, instead of reaching big organizations
  • New actor on the APT stage appeared: cyber-mercenaries conducting cyber-espionage on demand

A survey conducted by Kaspersky Lab and B2B International found that 91% of the organizations polled suffered a cyber-attack at least once in the preceding 12-month period, while 9% were the victims of targeted attack.


Monday, December 09, 2013

Computer Security Updates Week 2 of Dec 2013

We are back after some period of hiatus - this update is going to be a massive one.

Refer to Computer Security Updates Week 4 of Oct 2013; the biggest news was a report by USA Today about the shutdown of Silk Road by FBI.

For this week / last week, here are / were the biggest news.
  • Yahoo, Bernama - Dec 6, 2013 - Hundreds of millions swindled from banks in past 5 years, mostly by staff, say police
  • Press release - McAfee - Dec 5, 2013 - McAfee Finds 80% of Employees User Unapproved Apps at Work
  • USA Today - Dec 5, 2013 - Hackers stole almost 1.6 million login credentials and 320,000 e-mail credentials
  • Press release - Prolexic - Dec 2, 2013 - Akamai to Acquire Prolexic.
  • Press release - Prolexic - Nov 20, 2013 - Survey Results for DDoS Protection
  • Press release - Trend Micro - Nov 16, 2013 - Reports Cyber crimes from Nigeria.
  • Press release - Trend Micro - Nov 14, 2013 - Microsoft Releases 8 Security Advisories
  • Yahoo - Nov 3, 2013 - Philippine government sites hacked by Anonymous
  • USA Today - Oct 31, 2013 - Reports claimed that major Internet players' Data Centers were intercepted
  • Press release - IBM - Oct 18, 2013 - Made in IBM Labs: Two-Factor Security for Mobile Transactions.
  • Press Release - Huawei - Oct 18 2013 - Huawei Releases Cyber Security White Paper.

Sunday, December 08, 2013

Choosing the Right Mobile Broadband Plan

By, Malaysia’s largest and most comprehensive financial comparison site.

Broadband has already made a lot of breakthroughs in the tech industry. Who would have thought that a small dongle could carry a very strong connection? It has already made people become more efficient and productive. Internet has gone through an exciting transition, from dial-ups day up to mobile broadband portability and quick access.

How to Choose?

Choosing the best broadband plan can be a bit challenging, especially with so many features that ISPs offer. In choosing the right broadband plan, there are things that have to be considered:
  • Data- The amount of data depends on the actual usage of the subscriber. Users who are into gaming and streaming should get plans with higher connection speeds. Users who simply wish to browse and check emails, on the other hand, should get standard broadband plans.
  • Coverage- The area must be covered well by the internet provider to get the right speed.
  • Price- This will also depend on the usage of the subscriber. It is best to check the broadband packages that correspond with usage.

Saturday, December 07, 2013

Juniper Terminal Services Client Stopped Working Suddenly

Juniper Terminal Services Client is a software for VPN access provided by Juniper Networks.

I encountered issue when it suddenly stopped working properly two days ago.

I began to realize that it was due to some Windows updates which happened three days ago. After checking out the Windows updates history, I found that I had installed Internet Explorer 11 during that time and I knew I couldn't be more right.

It seems like upgrading to IE 11 had caused this issue - tested with other PC with IE 6 and it worked normally.

This web site suggests that Juniper Terminal Services Client is only supported by the following web browsers:
  • Microsoft® Internet Explorer 6.0 SP1 and above on Windows®
  • Mozilla Firefox 1.5 and above on Windows and Linux®

Hence, since currently I am using Firefox version 26.0 and I have no reason to downgrade, I figure that it would be a much worthy effort to download my Internet Explorer to previous version by uninstalling the updates I did three days ago and guess what ?  I managed to get Juniper Terminal Services Client come back working.

Thursday, November 28, 2013

Malaysian IT Industry : brace for impact in the coming 2 years

IT budget had been bad since the recent U.S economy crisis - based on my involvement with the media and IT industry, I saw that big IT companies were having difficulties acquiring new customers - big trends like cloud computing, big data, SDN fell shorter than expected - nobody was willing to acquire new technologies overnight in order to meet trends.

I could be wrong, nonetheless, based on my own data and observations, it couldn't go too wide out - correct me if I am wrong !!!

The downsizing of IT industry actually started since the crashed of dotcom and the Malaysian economy crisis in 1997, when it almost wiped out all IT departments gradually as years moved on.

I knew this as a graduate in May 2002, when I was employed as a programmer for a public listed manufacturing company based in KL with the minimum pay only - we had to work long hours as ever.

During that time, we were part of the IT department of the company. Hence, apart of developing the in-house ERP solution, the IT team was also responsible to deal with all other IT related tasks such as fixing printers, computer networking, checking out the Internet connections, commissioning and decommissioning PCs, servers and etc.

A few years down the road, such IT departments were no longer in existence - with the exception of bigger companies.

These days, IT departments are usually merged with finance, admin or operations departments and all your PC and server issues will be handled either by the vendors directly, otherwise, by outsourced service providers - sometimes these services are even rendered FOC as complimentary services.

As the matter of fact, my supervisor during my first job as programmer stated above was the finance manager; we never had a real IT manager.

Wednesday, November 27, 2013

ERP adoption in process manufacturing sector in Malaysia is still low

Press release - KUALA LUMPUR, 26 November, 2013

According to iContro Software Sdn Bhd, 100% homegrown, Malaysia-based ERP provider, the current level of Enterprise Resource Planning (ERP) computerisation in the manufacturing sector in Malaysia is very low. This is seen especially in the process based (eg paints) manufacturing sector.

Frank Lee, CEO of iContro Sdn Bhd particularly singles out the state of ERP systems in Process-based manufacturers, which he deduced is still ‘…at a very basic level of computerisation and automation’.
Frank Lee, CEO, iContro

Take note that the manufacturing industry is generally divided into two types - Process and Discrete, whereby the earlier is highly complex as it involves products that cannot then be broken down into its component parts once produced. Examples of process manufacturing include chemicals and raw material substances, oil & gas fuels, pharmaceutical goods and bio-engineered.

Tuesday, November 26, 2013

Malaysians Are Top Mobile Shoppers for Year-End Holiday Gifts in APAC

Press release - KUALA LUMPUR, 25 November 2013

Groupon recently released a Year-End Holiday Shopping Survey which was conducted across 12 markets in the Asia Pacific region. 25,070 respondents across 12 markets were surveyed online between 31 October and 11 November 2013. The markets include Australia, Hong Kong, India, Indonesia, Japan, Korea, Malaysia, New Zealand, Philippines, Singapore, Taiwan and Thailand. Those who took part in the survey were Groupon’s subscribers, including 1,115 respondents from Malaysia.

It makes me wonder why this trend happens ? Could it because Malaysia is a society which seeks freedom of expression in the Internet space ? or simply because the traffic congestion is too great in the urban or that e-commerce / m-commerce offers cheaper alternative ?

Check out full details and infographic.

Sunday, November 24, 2013

360 Security Software Detected My Own DLL as potential trojan

The DLL file which I programmed for MyKad reader was detected as potential trojan by 360 security software from China; perhaps it is due to the invocation of system level resources on Windows platform.

Thankfully, it caters for provisioning of white-listing.

Wednesday, October 30, 2013

ICT Happening Updates Week 5 of Oct 2013

The most significant news for Week 4 of Oct 2013 was launching of Mac OS 10 Mavericks and iPad Air by Apple.

For this week / last week, here are / were the biggest news.
  • WD announces Q1 2013 revenue of US$3.8 Billion.
  • Tata Comm. delivers improved margins as net profit turns positive YoY.
  • World of Tanks' Update 8.9 goes live with a new combat mode.
  • Silver Peak speeds Masterpet’s Data Replication across the Tasman.
  • The HTC One goes compact with the launch of the HTC One mini.
  • Intel Research finds older PCs reduce employee productivity.
  • SEEBURGER appoints CrimsonLogic as a strategic solutions reseller.
  • Viber provides updates for Windows phone version.
  • OpenSymmetry partners with AccelTeam to optimize Sales Performance in Malaysia.
  • Evernote brings intuitive digital writing to a whole new level with Penultimate.
  • Reuters: Start-up Vicarious claimed to have cracked CAPTCHAs.

MyIX Invests RM3.7 million for Infrastructure Upgrade

Press release - KUALA LUMPUR, 29 October 2013

Malaysian Internet Exchange (MyIX) or also known as Persatuan Pengendali Internet Malaysia’, today announced that they will be investing up to RM3.7 million to increase the bandwidth capacity of its central nodes interconnection in Klang Valley, from 10 Giga bits per second (Gbps) to 40 Gbps.

MyIX Chairman, Chiew Kok Hin says, “When we started in 2006, internet traffic consumption in Malaysia was only at 288 Megabits per second (Mbps) and a 10,000 Mbps capacity for the central node interconnection was more than sufficient.

Chiew Kok Hin, MyIX Chairman

Today this has grown to a staggering figure of 26 Gbps in combined traffic (as at June 2013), resulting in an 80 per cent capacity utilisation per leg of MyIX’s existing central node infrastructure. “This is the main driver why we are upgrading our infrastructure – which is approximately by 300 per cent more bandwidth capacity, to cope with the anticipated growth of the country’s Internet consumption over the next two years.”

In 2012 alone, MyIX recorded that local Internet traffic had increased by approximately 50 per cent with 149,889 Mbps recorded in the first half of 2013, as compared to 98,527 Mbps in the same period in 2012.

Tuesday, October 29, 2013

Home Ministry says background checks should have been done

Press release - Kuala Lumpur, 28th October 2013

CEO of Verity Intelligence Sdn Bhd Mark Leow commented that the two regrettable cases of trusting the wrong people, namely the Ambank robbery and the amok delivery boy, could have been prevented, if proper background check had been performed.

Although background screening is fairly new in Malaysia and is more common in mature countries, simple verification of potential employees could have prevented the recent tragedies, namely the Ambank robbery and the delivery boy running amok, said CEO of Verity Intelligence Sdn Bhd Mark Leow.

Mark Leow,CEO,Verity Intelligence Sdn Bhd

“My sincere condolences to each of the families of the deceased. If more employers take preventive measures of just verifying the backgrounds of their potential employees, these tragedies could have been prevented.

Verity Intelligence provides three due diligence services that every company needs:

1.) FitRecruit

Employee due diligence is a basic necessity for every company, either before hiring an employee or during annual audits of existing staff. Verity Intelligence’s FitRecruit service ensures an organisation has all the necessary information and details, including integrity checks, education verification and financial status on future hires/existing employees to ensure they hire only qualified, trustworthy employees.

Monday, October 28, 2013

Google Wants to Ensure that Everybody Has Got Online Presence

I've read this from; Google blog,; Google is launching three tools that aim to help suppressed messengers going online.

Two of the tools are related to DDoS while one related to peer-to-peer proxy.

Google had recently revised its policy towards web linking in relation to the search engine; apparently, they are discouraging unnatural links.

Malaysian 2014 Budget ICT Comments

The Malaysian 2014 Budget offers just a few initiatives that are related to ICT:

1.) RM 1.8 billion for HSBB Phase 2

2.) Increase in broadband speed

According to MyIX, the speed announced for the suburban and rural areas are sufficient especially where the exposure to the Internet is new and will take time to see increase in usage. However, 10mbps for the urban areas is rather low as the internet consumption of our urban population is closer to a developed country whereby the minimum offering of 50mbps is common and 10mbps is no longer sufficient to meet the demands of the urbanites.

3.) Underwater cables for Sabah and Sarawak

According to MyIX, the plan for underwater cables for Sabah and Sarawak are seen as strategic direction for Malaysia and is commendable as this will help position Malaysia as a regional gateway to the world. In layman terms, it is like building a highway across the South China Sea to facilitate the increasing demand from East Malaysia.

4.) RM 1.6 billion for rural areas with the building of 1,000 transmission towers

5.) Entrepreneurship initiative - MAGIC and the development programmes by 1MET

6.) Single ICT Ministry.

Multimedia Development Corporation (MDeC) is now under Ministry of Communications and Multimedia.

7.) Implementation of GST at 6% is likely going to affect consumption of consumer IT products such as printers, tablets and etc.

By and large, buying frequency will reduce whilst consumers are likely going to focus on getting the value-for-money than going after trendy colourful choices; i.e buying the best of breeds than buying lower quality products.

I anticipate business creativity from the market where merchants may also want to offer GST rebates as incentives for consumers to win sales from competitors. This is highly anticipated to rip out from 2nd tier product vendors.

Without a doubt, the GST implementation will encourage upheaval adoptions of financial accounting & tax solutions, particularly those in the SMEs market segment - this whispers good news for local vendors and distributors who have been waiting for it for a while already, I hope they have got the solution ready long before.

The GST will also spice up the financial, accounting & tax services industry in the Malaysian scene. Likewise, the demand for personal financial advisory and consultancy is expected to surge.

Check out full commentaries from Pikom and MyIX.

Malaysian Budget 2014 Infographic.

Friday, October 25, 2013

Computer Security Updates Week 4 of Oct 2013

Refer to Computer Security Updates Week 3 of Oct 2013; the biggest news was a report by USA Today that Adobe loses 2.9 mil customer records, source code.

Also check out the Email Interview with McAfee's Scott Thomas (Sr. Director, Network Threat Response).

For this week / last week, here are / were the biggest news.
  • The Telegraph: It was claimed that U.S spies on other key people.
  • McAfee survey reveals older does not mean wiser: Fifty Plus Booms Online.
  • Kaspersky Lab launches free app for secure web browsing on iPhone and iPad.
  • IBM protects Clients from Security Attacks with New Cloud Solution.
  • WatchGuard Technologies introduces Big Data Visibility Tools and Data Loss Prevention.
  • USA Today : FBI shutdown Silk Road.

Thursday, October 24, 2013

Gear Up for TanksAsia Season 2

Press release - October 23, 2013- Gear Up for TanksAsia Season 2

Wargaming, the leading free-to-play MMO developer and publisher, today announced the second season of the TanksAsia Masters. A total prize pool of USD100,000 are up for grabs through this final segment of the TanksAsia League.

64 teams across the Asia Pacific region registered for the second season and the first match of the Challenge series started on 20 October.

Games Poster

The league is divided into three tiers – Challenge, Regular and Masters. Each week, battles will be fought to determine the tier placings of the teams and points will be awarded accordingly. At the end of the season, the points earned by the teams will be accumulated.

The Challenge Series is a weekly online qualifier which will see the top four teams advance to Regular Series to compete in a round of eight against four teams (5th-8th placing in Season 1).

The semi-finals and the Grand Final will be held at the Taipei Game Show in January next year. The winning team of TanksAsia Season 2 will walk away with US$60,000 in prize money.

Original reference.
D : +65 6390 3315
M : +65 9725 2379
F : +65 6339 2738

Wednesday, October 23, 2013

ICT Happening Updates Week 4 of Oct 2013

The most significant news for Week 3 of Oct 2013 was IBM received U.S. Patent #8,352,953 for dynamic allocation of cloud resources based on networking bandwidth requirements and availability.

For this week / last week, here are / were the biggest news.
  • Latest enhancements on Oracle Eloqua’s leading marketing automation platform.
  • AMD Radeon R9 290X Graphics Card pioneers a new era in gaming experience.
  • Viber unveils New Blackberry Version With Multiple Feature Enhancements.
  • HP launches LaserJet Enterprise Solutions.
  • SFAM and Mimos Launches Talent Development Programme 2013.
  • Capillary Technologies launches Capillary InStore - personalised shopper recommendations directly on the sales floor.
  • Monster Singapore redefines the way employers search for talent.
  • USA Today: Facebook supported removal of potentially damaging content against total freedom of expression.
  • Fujitsu launches M10 Servers in Malaysia.
  • Apple launches Mac OS 10 Mavericks and iPad Air.
  • Brocade announces End-to-End Gen 5 Fibre Channel SAN Connectivity Support for EMCVMAX
  • Wechat in search for the next campus ambassador in Klang Valley Malaysia.
  • Bosch Software Innovations and Tech Mahindra announce global system integrator partnership.
  • Exabytes eCommerce Conference 2013 to outline Malaysia's Internet Retail Market;3 – 4 December 2013
  • Brocade announces Monitoring and Alerting Policy Suite (MAPS) and Flow Vision for SAN Deployments.
  • Oracle unveils enhanced Data Integration portfolio.
  • Brocade Names Ari Bose as Chief Information Officer.
  • WD® announces Speak Out in Style campaign; starts from 17 Oct 2013 to 28 February 2014.

Tuesday, October 22, 2013

Outsourcing Industry to Double in Growth by 2017

Press release - KUALA LUMPUR, 22 October 2013 – Outsourcing Industry to Double in Growth by 2017

Outsourcing Malaysia (OM), an initiative under PIKOM, today shared that the outsourcing industry in Malaysia is set to double in growth by 2017 with a Compound Annual Growth Rate (CAGR) of 15 per cent from its current 2012 revenue of USD1.7 billion.

OM announced its second industry report titled ‘Malaysia’s Global Services Outlook’ in conjunction with the four day international Asia-Pacific Outsourcing Summit (APOS) in Iskandar, Johor. The research findings by leading B2B market researcher Valuenotes, was commissioned by OM to provide the SWOT (Strength, Weakness, Opportunity, Threat) insights of the industry in Malaysia.

Outsourcing Malaysia unveils the 'Malaysia's Global Services Outlook' research in APOS2013

Monday, October 21, 2013

Jack Ma Believes in Open and New Age Economy

A little out-dated but still relevant - from Jack Ma,

1.) Help SMEs to make more money.

2.) Help solve society's problem.

Hired economists and sociologists.

3.) Give competitors opportunities to compete - do not play the monopoly game.

4.) Be transparent.

5.) Global vision, local wing.

ASUS HOTLINE Service Centre number: 03-7724 3495

I've been informed by PR firm that effective from 21st October 2013 onward, the ASUS HOTLINE Service Centre number will change to 03-7724 3495.

The old phone number, 03-2053 5077 will be no longer in service.

Kaspersky Lab Expert Analyses APT Icefog

Press release - Petaling Jaya, October 18, 2013

Kaspersky Lab’s security research team recently published a research paper on the discovery of the Icefog cyber-espionage campaign which is described as a small yet energetic Advanced Persistent Threat (APT) group that focuses on hitting the supply chain of Western companies in South Korea and Japan. Sinkhole connection in Malaysia and Singapore were also observed. The operation started in 2011 and has increased in size and scope over the last few years.

“Icefog is different. The ‘hit and run’ nature of the Icefog attacks demonstrate a new emerging trend, of smaller hit-and-run gangs that go after information with surgical precision. The attack usually lasts for a few days or weeks rather than the months or years of more traditional APTs. After obtaining what they were looking for, the Icefog attackers clean up and leave. In the future, we predict the number of small, focused ‘APT-to-hire’ groups to grow, specializing in hit-and-run operations; a kind of ‘cyber mercenary’ team for the modern world,” Mr. Molsner explained; Mr. Michael Molsner, a member of the Global Research & Analysis Team who is based in Japan, and who is part of the team credited with discovering and analyzing the Icefog APT.

The source of attacks were predicted to have been originated from China, South Korea and Japan.

Saturday, October 19, 2013

Email Interview with McAfee's Scott Thomas (Sr. Director, Network Threat Response)

We've been invited for an email interview with McAfee's Scott Thomas, Sr. Director, Network Threat Response and hence we asked them five questions:

1.) The latest security landscape is kind of messy - too much information, too many vendors and limited market for the enterprise space and lack of maturity in law enforcement pertaining to cyber-space security.

What is your comment on this?

How can it be better?

2.) The bet on APTs was too high.

Verizon DBIR 2013 reported that 75% of data breaches are opportunistic, meaning that they are not APTs. While big cyber-security companies and other big boys are betting high stakes on holistic enterprise security solution with intelligent, consumer-based products seem to be too competitive.

Do you think that there is a mismatch in the market?

3.) I understood that McAfee - DeepSAFE technology is hot on wheels.

Briefly expiain your top selling products currently and next bet for coming years?

4.) Give me your other comments on our 2013 Q3 review.

5.) Anything interesting for Malaysia and ASEAN?

Check out the full answers.

Friday, October 18, 2013

SQL Friendly Database Insert and Update Process

Disclaimer: This article if read without prior experience may end up boring and dry.

T-SQL Insert and Update are part of the Data Manipulation Language (DML).

The biggest bane with T-SQL DML belongs to an issue so common that 100% of programmers will encounter it in the first place - the reason being is that we had expected the T-SQL to be more intelligent friendly, but it didn't.

As the matter of fact, T-SQL is not that friendly and it requires one to follow specific rules.

The biggest bane is to perform DML with string data that consist of single quotes; it will result in exception because under T-SQL, single quote is considered to be a control character or reserved character. Hence, when a string data consists of single quote such as Brandon's PC, it will create confusion.

The best practice solution is to perform what is known as single quote offset.


Suppose I want to perform INSERT into a table called EmployeeTBL

INSERT INTO EmployeeTBL (Name,Position) VALUEs ('Brandon', 'General Manager')

When single quote is required to be present as part of the data, it will go like this supposedly.

INSERT INTO EmployeeTBL (Name,Position) VALUEs ('Michelle', 'Brandon's PA')

Nevertheless, the above T-SQL statement will generate exception; 'Incorrect syntax near ...'

The solution to perform single quote offset by adding an additional single quote in front of the single quote which belongs to the string data, hence:

INSERT INTO EmployeeTBL (Name,Position) VALUEs ('Michelle', 'Brandon''s PA')

Notice that now Brandon''s PA has two single quotes - this is what we mean by offsetting, it will work well for T-SQL.

Today, I just want to go further to discuss some strategies to deal with this issue on a broader perspective.

Continue reading.

Thursday, October 17, 2013

ICT Happening Updates Week 3 of Oct 2013

The most significant news for Week 1 of Oct 2013 was Cisco delivered network convergence system to power "Internet of Everything".

For this week / last week, here are / were the biggest news.
  • New compact PoE switch from Brocade targets federal market.
  • Silver Peak releases software updates: Virtual Acceleration Open Architecture (VXOA) 6.2
  • WD introduces new Ultra-Compact Network Storage.
  • ASUS announces Next-Generation Fonepad 7
  • IBM: Dynamically Managing Network Bandwidth in a Cloud
  • OpenNet: Affected fibre cables at Bukit Panjang Exchange restored
  • HP expands Z Workstation Portfolio, unveils world’s first workstation ultrabook
  • NS BlueScope hosts inaugural green archictecture gathering amongst VIETNAM architects
  • Hitachi Sunway makes the first Hitachi Storage Sale in SEA
  • hybris names as a B2B commerce leader by global independent research firm
  • AMD unleashes R9 series graphics cards with AMD Radeon R9 270X and AMD Radeon R9 280X
  • FalconStor® CDP and FalconStor® NSS 7.5 solutions now available and shipping
  • European IT Services Leader Saves Costs by Optimizing Global Network with Silver Peak
  • Oracle introduces new x86 servers
  • 10.10 mystery deal by Groupon Malaysia.
  • Philips launches ideas competition campaign “Innovation That Matters to You” in Malaysia
  • Bosch launches new DIVAR IP recorder family with integrated Dynamic Transcoding Technology.
  • Tata Comm. launches mobile messaging exchange service.

Symantec’s Top Tips and Best Practices for Consumers on Information Protection:

Endorsed by Symantec:

1.) Defend Your Data

A comprehensive security suite provides a strong defense against online threats. Norton 360 Multi-Device offers protection for PCs, smartphones and tablets, in a single solution

2.) Think of Mobile Devices as Mini-Computers

Mobile is the fastest-growing target for cybercriminals. Make sure your mobile device requires a password, and take precautions to ensure you device is protected against theft, loss and cybercrime

3.) Be Cautious in the Cloud

While cloud storage solutions make it easy to save and share files, they also open other avenues for attack. Be careful about who has access to your files, and use a solution with built-in security if possible

4.) Save Sensitive Transactions for Secure Connections

Free or unsecured Wi-Fi networks can make it easy for thieves to eavesdrop on your activity. Avoid doing any sensitive transactions like banking or shopping while connected to these networks, or use a personal VPN client

Tuesday, October 15, 2013

Computer Security Updates Week 3 of Oct 2013

Refer to Computer Security Updates Week 4 of Sep 2013; the biggest news was the announcement that Symantec successfully 'sinkhole' the massive ZeroAccess Botnet.

For this week / last week, here are / were the biggest news.
  • 56% of users value the data stored on computer much more than device itself.
  • Another Hong Leong Bank phishing site discovered.
  • Kaspersky Internet Security 2014 successfully neutralised 100% threats during tests
  • ESET Blog: Governments hit by “shortage” of experts
  • Symantec: Phishers use Malware in fake Facebook app.
  • Prolexic protects OnCourse Systems' SaaS Applications against DDoS Attacks.
  • IDC: Barracuda as Content Security Appliance and Virtual Appliance Volume Leader
  • Reuters: Mobile security software maker Lookout raises $55 million
  • Cisco completes Acquisition of Sourcefire.
  • The Telegraph: GCHQ leaks have 'gifted' terrorists ability to attack 'at will', warns spy chief
  • Kaspersky provides updates for Android and iOS versions of Kaspersky Security for Mobile.
  • Trend Micro: Microsoft releases 8 security advisories.
  • Reuters: Microsoft awards hacking expert
  • Kaspersky prevails in legal fight against technology Patent Troll.
  • USA Today: Adobe loses 2.9 mil customer records, source code
  • McAfee delivers unprecedented situational awareness with enhanced SIEM Solution.
  • 2013 Norton Report: Cost per Cybercrime Victim Up 50%.
  • McAfee announces Find, Freeze and Fix Advanced Threat Defense Solution.
  • USA Today: Iran's cyberwar commander assassinated

Monday, October 14, 2013

Developers Updates Week 3 of Oct 2013

In the last updates series (Week 4 of July 2013), the most interesting update was Red Hat advanced OpenShift Enterprise with new release.

For this updates series, the followings had emerged.
  • CodeRage 8 – The online Delphi Developer Conference, October 15-17
  • Google announces HTML-5 web designing software.
  • HP provides open SDN SDK HP SDN App Store.
  • Google cloud developer challenge;November 21st: First round submissions due.
  • Valeo innovation challenge - for automotive innovation; phase 1:11-Sep-2013 to 14-Feb-2013.
  • AT&T Malaysia Hackathon.
  • Rockford Lhotka : .NET has an extended future.
  • AMD: World’s first real-time facial capture technology for the unity development platform.
  • Intel releases C++ compiler for Android.
  • IBM narrows Big Data skills gap by partnering with more than 1,000 global universities.
  • AMD's Never Settle Forever program
  • MySQL Workbench 6.0 increases productivity with new design and enhancements.
  • Code Project - A Coder Interview With DNN's David Rodriguez.
  • Dell announced new release of Toad for Oracle and redesigned Toad World community.

Friday, October 04, 2013

T-SQL - 'Group By' Vs 'Distinct'

Just sharing, no big deal!

'Distinct' is the same as 'Group By'.

'Distinct' may achieve the same result as 'Group By' depending on the data.

1.) T-SQL_1:

SELECT cUserID,max(cDate),max(cDeviceID),max(cUsername) FROM Trans_Table
Group by cUserID
Order by cUserID

2.) T-SQL_2:

SELECT distinct(cUserID),max(cDate),max(cDeviceID),max(cUsername) FROM Trans_Table
Group by cUserID
Order by cUserID

T-SQL_1 and T-SQL_2 return the same result

BURSA MALAYSIA adopted Oracle RightNow CRM Cloud Service

Press release - Kuala Lumpur, 03 October 2013

Bursa Malaysia (previously known as Kuala Lumpur Stock Exchange, KLSE has implemented Oracle RightNow Cloud Service to improve its customer care and services as to record, track and escalate all inquiries and complaints. The deployment has helped Bursa Malaysia significantly reduced a large volume of basic inquiries, improved response time by 80%, slashed customer complaints by more than 70%, and cut staff costs by 40%.

Jimmy Cheah, Managing Director, Oracle Malaysia

Jimmy Cheah, managing director of Oracle Corporation Malaysia said, “Malaysian organizations need to move beyond their existing technology infrastructure and simplify it. Bursa Malaysia is leveraging cloud technologies to save costs, implement business solutions faster and importantly, serve its customers better. Bursa Malaysia is exemplifying the way forward for the financial services industry and Oracle is proud to be its technology partner."

Oracle RightNow is an enterprise CRM solution.

Original reference.

Media Contact:

Judy Wong
Pi PR Consultancy Sdn Bhd

Thursday, October 03, 2013

Translate Your World Announces Voice Translation Software for Business

By Sue Reager, President

Translate Your World, developers of linguistic and mobile marketing technologies, announced today the release of its TYWI-Live (“tie-wee”), an online voice translation software for serious business use that turns conferences, business meetings, and webinars into a multi-language experience.

As people speak, their words are automatically translated into 78 languages at the same time. Attendees can choose to read the speech translation as subtitles or hear a translated synthesized voice, similar to Apple’s Siri. In addition to automated voice translation, TYWI-Live also enables online human simultaneous interpretation via the Web by interpreters located anywhere in the world.

TYWI-Live speech translation is compatible with desktop, laptop, tablet and smartphone and can be used in conjunction with most major presentation software including WebEx, GoToMeeting, Skype, Adobe Acrobat, Blackboard, and others.

Wednesday, October 02, 2013

The Bolt-on Challenge: Closing Security Gaps Through an Integrated Security Architecture

By Ivan Wen, Country Manager Sourcefire Malaysia

As our IT environments have expanded to include networks, endpoints, mobile devices and virtual assets so have our security tools. Most organizations have ended up with a set of disparate technologies across these control points that were never designed to work together. The result: breaches happen. It’s a fact of life. As our protection methods improve and security effectiveness levels reach new heights, the bad guys are digging deeper and using advanced techniques and new attack vectors to circumvent existing protection methods. The integration done to date, if any, is typically one way – the visibility and analysis isn’t automatically correlated and translated into action so that we can contain and stop damage and prevent future attacks. And the data gathered is usually a snapshot in time, not continuously updated to monitor activity as it unfolds.

Ivan Wen, Country Manager, Sourcefire Malaysia

To complement integrated visibility and analysis we need integrated and automated controls and intelligence. And we can’t just focus on point in time data; we must remain continuously vigilant to combat today’s more sophisticated attack techniques. What happens in the case of malware that disguises itself as safe to evade detection and exhibits malicious behavior later? Or when indicators of compromise are imperceptible on their own and only point to an attack when distinct data points are correlated – such as an endpoint trying to access a database that it wouldn’t normally, while a system on the network attempts to communicate back to a known bad (blacklisted) IP address? Integration must address the full attack continuum, not just before an attack but also during and after, so that we can adapt our defenses and take action to protect our assets.

What’s needed is a tightly integrated enterprise security architecture. A 2012 survey by market research firm Enterprise Strategy Group found that 44% of enterprise security professionals believe that over the next 24 months their organizations are likely to design and build a more integrated enterprise security architecture to improve security controls with central policy management, monitoring and distributed policy enforcement.

Tuesday, October 01, 2013

ICT Happening Updates Week 1 of Oct 2013

The most significant news for Week 4 of Sep 2013 was the The Telegraph reported that BlackBerry agreed to sale for $4.7 bn.

For this week / last week, here are / were the biggest news.
  • Pizza Hut Singapore deploys predictive consumer behavioural intelligence.
  • Brocade and EMC Work Together to enable Software-Defined Storage for EMC Fibre Channel SAN Install Base.
  • AMD Selects Sapphire as Exclusive Global Distribution Partner for AMD Firepro.
  • First-Ever YouTube music awards@3-Nov-2013 !!
  • Arkadin becomes an official provider of Tata Comm.’ jamvee™ video service.
  • WD new MyBook line offers up to 4TB of Storage and auto backup with Dropbox.
  • Evernote Conference 3 (EC3) took place in San Francisco
  • Oracle advanced its vision of the “Future of Work” during Oracle OpenWorld 2013.
  • SG Govt to spur VC initiatives.
  • Tata Comm. trials next generation video distribution with Formula 1.
  • Cisco delivers network convergence system to power "Internet of Everything"
  • IBM announces US $17 Million investment in new cloud datacenter
  • Adobe delivers standardized audience metrics for digital publishing industry.

Sunday, September 29, 2013

Computer Security Updates Week 4 of Sep 2013 and 2013 Q3 Review

Refer to Computer Security Updates Week 2 of Sep 2013; the biggest news was the news reported by Reuters that the U.S tapped into networks of Google, Petrobras, others; first ever case of mobile Trojan spreading via ‘alien’ botnets discovered.

On Week 1 of Sep 2013, New York Times, Twitter hacked by Syrian group; USA Today reported that NSA performed exercise which used supercomputers to crack Web encryption.

On Week 5 of Aug 2013, Yahoo reported that China to probe big IT firms after Snowden leaks.

On Week 3 of Aug 2013, Reuters reported that U.S house of rep rejected bid to curb spy agency data collection.

On week 3 of July 2013, Oracle issued 89 security fixes.

On July 1, 2013, Malaysian domains were compromised by hacker Tiger-m@te, allegedly Bangladeshi origin

The trends and news which emerged from Q3 2013 for computer security carry themselves a few common themes.
  • Software makers to be made responsible for security bugs - the industry seems to be moving towards this direction and this is bad news for software makers.
  • The NSA, Snowden, PRISM, cyber-espionage related news help people to understand the cyber security landscape better.  
  • and the biggest Internet players were taken to tasks with personal data protection. 
  • DDoS attacks stopped.
  • Based on Q1 2013 and Q2 2013 review, two trends are brought forward to Q3. 1.) Mobile trends such as BYOD serves as catalyst for growth in security vulnerability; 2.) Security companies introduced proactive approach for security solution - with Intelligent security features - Verizon DBIR 2013 confirms that 71% of breaches targeted user devices than servers.
  • Even though enterprise security vendors are banking on proactive approach with enhanced intelligent, however not much APTs recorded - Verizon DBIR 2013 confirms that only 25% of breaches are APTs related while others are opportunistic and 78% graded as less sophisticated.
  • and what was worst is that despite 78% being graded as less sophisticated attacks, 66% took months to be discovered and 69% of those (discovered are) by external parties.
  • Parallel with 2012 and predictions for 2013, zero-day exploits are still popular and Android malwares continue to grow.

Some interesting facts to note:
  • Facebook said no to Putrajaya’s request for details on 197 users.
  • The high cost of a security breach: averages $649,000.
  • Cybercrime costs the global economy between $100 billion and $500 billion annually.
  • Lloyds survey found that cyber threats are now the third biggest worry for CEOs.
  • F-Secure: The most used exploits kits in the world is BLACKHOLE.
  • F-Secure: CVE-2011-3402 is among the most targeted vulnerabilities in the world.
  • F-Secure: Worm: W32/Downadup (also known as Conficker) is the most detected threat in Malaysia.

For this week / last week, here are / were the biggest news.
  • The Bank of Fakes – almost a third of users have received bogus bank emails.
  • Secure Identity Alliance welcomes three new members.
  • Symantec successfully sinkholes significant part of the massive ZeroAccess Botnet
  • AccessData Announces Interoperability with HP ArcSight to Deliver Accelerated Incident Response to Security Threats.
  • CyberArk unveils Master Policy.
  • Verizon: 2013 Data Breach Investigation Reports (DBIR).
  • Kaspersky Lab exposes “Icefog” APT: a new cyber-espionage campaign focusing on supply chain attack.
  • AccessData: Broken cyber security model insufficient against APTs.
  • ECSB strengthens security portfolio through new partnership with Barracuda.
  • American Express Malaysia phishing site is discovered. today@ --> please DO NOT visit!
  • Cellebrite presents Mobile Forensics trends for year 2014.
  • F-Secure’s Latest Threat Report: nearly 60% of F-Secure’s top ten detections in the H1 2013 were exploits.
  • Microsoft has published a security advisory on vulnerability in IE.
  • Kaspersky: more than 1/3 malware attacks costs users money.
  • Reuters: Hackers offered cash to crack iPhone's fingerprint security.
  • Symantec: Hidden Lynx, pioneers of 'watering hole', professional for hire.
  • Mcafee: Lily Collins the most dangerous cyber celebrity of 2013, Rain emerges as Asian equivalent.
  • Reuters: Iran unblocks Facebook and Twitter access
  • Kaspersky Lab Brings its Best Security Technologies Together
  • AccessData partners with Contego Solutions to Fortify Digital Forensics Capabilities of Middle East Enterprises.
  • Bouygues Telecom Secures Critical Business Systems with CyberArk Solutions.
  • Reuters: Hacker steals two million Vodafone data.

Wednesday, September 25, 2013

UPSI Launches First PSYCHOMETRICS PROFILING for student assessment

Press Release - KUALA LUMPUR, 24 SEPTEMBER 2013

Universiti Pendidikan Sultan Idris (UPSI) in Tanjung Malim, Perak recently launched UPSI Pscychometrics; a project developed in collaboration with MIMOS to be used in educational institutions to better assess students as well as academic staff.

The Psychometrics Cluster at MIMOS is instrumental is promoting and practising psychometrics in Malaysia and has the expertise in the fundamentals and applications of psychometrics theories and techniques as well as psychometric-related technologies for educational as well as psychological testing in Malaysia.

UPSI Psychometrics launched by Datuk Dr Abu Bakar Mohamad Diah, MOSTI Deputy Minister. Looking on is Dr Haniza Yon, Head of MIMOS Psychometrics Cluster.

Monday, September 23, 2013

ICT Happening Updates Week 4 of Sep 2013

The most significant news for Week 2 of Sep 2013 was the announcement of iPhone Series - iPhone 5C and 5S.

For this week / last week, here are / were the biggest news.
  • Lotaris In-AppCommerce now supports Android.
  • Hello OpenWorld, it has been one year - Oracle unveiled New In-Memory Capabilities during Oracle OpenWorld 2014.
  • KLMUC & Cosmopoint College of Technology join Adobe® Creative Cloud.
  • Investment giant accelerates data, saves US$60,000 a year with Silver Peak Software.
  • The Telegraph : BlackBerry agrees to sale for $4.7 bn
  • O'Briens, HTC Malaysia, Moola and 12FLY Join the WeChat Family!
  • HTC Malaysia Celebrates HTC Day!
  • I-PMart Lifestyle Link: The All-in-one Card Link to your modern lifestyle
  • Download, print out and program your own robots by May 2014!
  • The Evernote repackages itself for the Apple Family, with Evernote for iOS7 and Presentation Mode
  • SEEBURGER partners BPM Consulting to penetrate into Singapore, Sri Lanka and India markets.
  • P1 celebrates 5th Anniversary with truly unlimited broadband plans.
  • BlackBerry introduces the New BlackBerry Z30 Smartphone with 5” Display and BlackBerry 10.2 OS.
  • Brocade revises New Brocade VCS Fabric and launches New Brocade Vyatta 5600 vRouter
  • Online retail giant speeds up market expansion with hybris.
  • Kamcord announces beta solution for Android
  • Oracle launches In-Memory cost management application for Oracle E-Business Suite.
  • Tata Comm. and PCCW Global bring Voice over IPX and HD voice to mobile operators worldwide.
  • Oracle Eloqua AppCloud now integrated into the Eloqua Topliners Community.

SAM's Groceria First Premium Urban Grocer at Gurney Paragon, Penang

Press release - 22 SEPTEMBER 2013 - PENANG:

First retailer in the Asia-Pacific region to introduce the use of the Personal Shopping System by Motorola Solutions that is set to provide an even more convenient and hassle-free shopping experience.

SAM’s Groceria, the latest premium urban grocer to hit the Malaysian market was officially launched today by Dato’ Hasan bin Malek, the Minister of Domestic Trade, Cooperatives, and Consumerism at the Gurney Paragon Mall. Also present at the launch was Datuk Wira (Dr) Haji Ameer Ali bin Mydin, Executive Director of SAM’s Groceria and Dato’ Khor Teng Tong, Executive Chairman of Hunza Properties Bhd.

Minister of Domestic Trade, Co-operatives and Consumerism, Dato’ Hasan bin Malek ‘checks-out’ with his purchases at SAM’s Groceria Gurney Paragon Mall. Looking on are Anand Mehta, the Retail Director of Motorola Solutions, Asia Pacific (second from left), Touch ‘n Go Chief Executive Officer, Abdul Karim Md Lassim (third from left) and SAM’s Groceria Executive Director, Datuk Wira (Dr.) Haji Ameer Ali bin Mydin

With a total investment of RM34 million, SAM’s Groceria marks homegrown wholesale and retail titans, MYDIN’s first venture to capture the high-end grocer segment.

Equipped with this portable mobile computer device that comes with an integrated bar code scanner, customers will be able to self-checkout items by themselves.

Sunday, September 22, 2013

To uphold net-neutrality and fight for free speech

I see a web site that I like, I blog it and I hyperlink it - that was the net neutrality that I knew for many years since the inception of Internet in my country, I believe that to be around year 1995 - 1996.

Hence, for many years, we have been doing hyperlinks and link-exchanges, tell me now unnatural that could be ???

Following Google's directive link schemes guidelines, IT-Sideways will have to make certain changes moving forward.

1.) All uninvited linkage to external URLs will not be hyperlink tagged.

This is important to protect myself.

It will simply be a text. For instance, the; Google's Link Schemes directive,no-follow,

It is quite old fashion and messy...

2.) Dropping the branding of Tech Blog Malaysia.

IT-Sideways has ranked no.1 for this search key word for many years on Google, Yahoo and MSN. Now I feel it is an appropriate time to move forward.

This blog aspires to become more globalized, vibrant, adopt more varieties and support more functions.

Friday, September 20, 2013

Google wages war against illegal online marketing, SEO and etc

For many years since 9 years ago, people emailed me requesting for links exchange and etc.

Now, this blog received emails from the same people requesting for removal - it is quite annoying actually.

It turns out the following to be true.

Referring to the link schemes guidelines from Google.

1.) Unnatural comments - need to enable comment moderation.

2.) Unnatural links - other people shall not create link to your sites without your knowledge, only the web owners shall create contents and request to be published on other web sites with incoming links.

In other words, it is better not to link to other web sites even if you find something interesting. If you have to, get the permission from the content owners.

Alternatively, just do the followings:
  • Adding a rel="nofollow" attribute to the tag
  • Redirecting the links to an intermediate page that is blocked from search engines with a robots.txt file

Thursday, September 19, 2013 convert hex to decimal - Beware of overflow

First thing to do is to understand hex or hexadecimal.

To understand hex, the first rule is to know that it is a numbering system and hence it consists of a series of number represented by 0-9, A-F.

Hence, it starts from 00,01, 0F,10... FF

So, what happens after FF ?

The answer is, since FF is equivalent to 255, what comes next is 256.

Using scientific calculator, 256 (decimal)--> 0100 (hex).

For example, manual conversion of a hex number from B372837E to decimal representation, using MS Excel can be calculated as:

= [11*POWER(16,7)] + [3 * POWER(16,6)] + [7 * POWER(16,5)] + [2 * POWER(16,4)] + [8 * POWER(16,3)] + [3 * POWER(16,2)] + [7 * POWER(16,1)] + [14 * POWER(16,0)]

In terms of programming in VB.NET or C#.NET, to convert a hex to decimal, just need to use 'System.Convert.ToInt32' function.

However, please take note that the tricky part is always about overflow.

In retrospect, the decimal equivalent of B372837E is 3010626430 or 3,010,626,430.

Hence, if you perform System.Convert.ToInt32(tempStrHex, 16), it will result in a funny negative number, this is because Int32 is actually a signed integer; the maximum positive number is 2,147,483,647.

The solution is to make use of 64 bits integer.

Dim tempNum as UInt64

tempNum = System.Convert.ToInt64("B372837E", 16)

It will work.

Saturday, September 14, 2013

Pi and Fortune In Malaysia-Indonesia PR Alliance

KUALA LUMPUR, JAKARTA, 13 September 2013 – Locally established PR agency - Pi PR Consultancy Sdn Bhd announced its latest partnership alliance with Southeast Asia's leading integrated strategic communications company, PT Fortune Pramana Rancang also known as ‘Fortune PR’. The partnership alliance was formed in the recently signing of a Memorandum of Understanding (MoU) with Fortune PR, making Pi the focus PR agency in Malaysian market for Indonesia’s largest independent public relations and strategic communications consultancy in effort to derive more project leads from Malaysia’s increasing trend of local and MNC companies expanding into the vast Indonesia market.

Fortune PR was started in the 1980's as a subsidiary of FORU (IDX-listed communications group) and was one of the earliest public relations consultancies in Indonesia. In FY2012, Fortune PR recorded an annual revenue over 10 million US Dollar and was the second fastest growing PR firm in the world, according to 2013 World PR Report published by The Holmes Report. The firm has more than 100 headcounts in Jakarta office alone and has recently started boutique consultancy in Singapore.

Friday, September 13, 2013

splinter blog : Salaries for Developers and Designers across the world

Malaysia is amongst the lowest in the world, this explains for many things - no passion, no motivation, no will to succeed, and always wanted to start own business.

And so if you want to consider yourself to be the best software engineers in the world with the best pay, these are the company you should send your resume to:

Amazon, Apple, Cisco, eBay, Facebook, Google, HP, IBM, Intel, Intuit, Microsoft, Oracle, Qualcomm, Yahoo, Zynga.

The highest based salary per year for 2012 was from Google: $128,336.

To gauge oneself, if you are an entrepreneur in software industry, and assuming that you are able to get a project with a paycheck of RM 130,000 per year, then perhaps there is no need to send your resume to Google - you're doing fine actually.

Good luck!

Check out details and here.

Thursday, September 12, 2013

Enlogic : the PUE can be misleading

While PUE does provide an effectiveness metric of the facility services to the IT equipment; it does not provide any meaning in relation to IT equipment efficiency, and in fact can become quite misleading.

“Take an extreme example; imagine a data centre full of thousands of computer servers sitting idle, but consuming energy. Suppose such a data centre has a well-managed facility with a PUE of 1.4; would one believe this is an efficient date centre despite no computing work being done?” quoted Eddie Desouza, Head of Business Operations, APAC for Enlogic.

While reducing total energy consumption is ultimately more important than reducing the PUE, many managers are setting their individual and facility performance goals based on improved PUE, not necessarily reduced energy which is harder to quantify.

Wednesday, September 11, 2013

Computer Security Updates Week 2 of Sep 2013

Refer to Computer Security Updates Week 1 of Sep 2013; the biggest news was a report by Reuters about the hacking of New York Times, Twitter by Syrian group.

For this week / last week, here are / were the biggest news.
  • Bank Rakyat phishing site surfaces-
  • Sophos Mobile Control delivers immediate support for the Apple iOS 7.
  • Kaspersky Lab wins AV-Test Innovation Award for securing online financial transactions.
  • Reuters: Sourcefire achieves strong partner ecosystem growth across APAC Region.
  • FireEye targets IPO between $12-$14 per share.
  • Reuters: U.S tapped into networks of Google, Petrobras, others.
  • McAfee delivers updates 2014 Core PC security products.
  • Kaspersky Lab: First ever case of mobile Trojan spreading via ‘alien’ botnets.
  • Reuters: Security camera maker penalized for bugs - not so good news for software makers.

Tuesday, September 10, 2013

NCR Introduces APTRA Interactive Teller to Transform Branch Banking Experience in SEA

Singapore. September 9, 2013 - NCR Corporation today launched NCR APTRA™ Interactive Teller, a new ATM-based technology that makes everyday banking transactions easier for customers by allowing them to complete more than 95 percent of typical branch transactions at the ATM assisted by a live remote teller, well beyond operating branch hours.

NCR APTRA Interactive Teller will help banks in South East Asia to take a new approach to grow their geographic footprint and focus on transforming their branch location into a more effective service and sales environment. It will allow banks to offer after-hours full teller services in areas that are not served by branches, while taking advantage of the advanced features of NCR ATMs such as intelligent deposit, bill pay, new account opening and loan initiations.

Beyond talking to a teller, Interactive Teller offers more services than can be conducted on an ATM or other self-service devices. For instance, customers can perform secure transactions without using a traditional ATM card and, like branch tellers, remote tellers can provide customers access to cash in their accounts in amounts over the standard ATM daily cash withdrawal limits. An internal study done by NCR shows that the implementation of NCR’s interactive video technology can result in a 33 percent reduction in transaction time and 40 percent savings for the cost-per-transaction, as compared with a branch teller transaction.

Monday, September 09, 2013

ICT Happening Updates Week 2 of Sep 2013

The most significant news for Week 1 of Sep 2013 was the announcement of acquisition of Nokia by Microsoft.

For this week / last week, here are / were the biggest news.
  • Apple introduces latest iPhone Series - iPhone 5C and 5S.
  • The Star Online: Public Service D-G advises social media users to online prudently.
  • HTC unveils new, mid-range HTC DESIRE 500
  • HSIS Enterprise Applications Division extends to Southeast Asia.
  • Brocade names Bill Lipsin as VP of Worldwide Channel and Global Systems Integrator Sales.
  • Daimler aims to launch self-driving car by 2020.
  • HP expands capacity with new Scitex ink manufacturing plant@Israel.
  • Bosch revolutionizes conferencing with IP-based solution, DCN Multimedia.
  • Intel unveils new technologies for efficient cloud data centers.

Saturday, September 07, 2013

Tata Comm. Case Study: Powering 67 million unique users at

On race day, every second counts. With enthusiasts around the world glued to, the smallest technical glitch or performance issue could have a huge impact on both fans and the Formula One Management organisation. is the official website of Formula 1®, representing the brand around the world.

The website is a highly interactive and engaging platform for fans that depend on it to stay updated on all things F1®. While the site sees substantial traffic on any given day, the traffic to the site increases exponentially on race days. These typically see spikes of up to 100 times the usual number of visitors accessing the site, using multiple devices including laptops, handheld devices such as tablets, and mobile phones; as well as from multiple platforms and web browsers. This diversity demands that the web systems provide consistent performance and user experience across a multitude of network bandwidths and rich media-capable devices.

With an ever-increasing number of fans using the website, Formula One Management challenged Tata Communications to deliver a flawless experience for and provide fans a more innovative web experience in the future. The requirement was for a content acceleration that provided:

Consistent delivery of content to users accessing the site from anywhere in the world, on even slow connections (such as 2G or dialup) Instant-on delivery and highly reduced latency

Friday, September 06, 2013

EMC Survey Reveals Big Data Adoption Trends in Malaysia

Kuala Lumpur, Malaysia– September 5, 2013 - EMC® Corporation today released the findings of a survey that asked I.T. decision makers in Malaysia for their perspective on the challenges and opportunities that Big Data and I.T. transformation – and related skills – can present to their companies. The Malaysian results will be added among the thirty-six country-level survey results being collected through EMC Forum events taking place around the world between June and November 2013.

EMC Malaysia Managing Director  Cheam Tat Inn addressing the attendees at EMC ForumTom Zack, President - SEA, EMC  Corporate at EMC Forum Malaysia

Survey details.

Key Findings:

In Malaysia, Big Data is giving rise to markedly improved decision making and is having a significant impact on companies’ competitive differentiation and ability to avert risk.
  • 88% of Malaysian businesses surveyed reported that better use of Big Data will lead to better decision making
  • 69% of respondents believe that Big Data will be a key factor in determining winners and losers in their industry
  • 40% have already achieved a competitive advantage as a result of Big Data analytics technology
  • 69% believe that those industries that succeed will be the same ones using Big Data tools
  • 67% of respondents also agree that Big Data technology will prove vital in identifying and protecting against cyber-attacks
  • 89% agree that data center automation will be crucial to innovation and agility over the next three years

Wednesday, September 04, 2013

SOFTEC Asia 2013

Petaling Jaya, 3 September 2013 (Tuesday) – Today with the rapid integration of businesses in ASEAN, many Chief Information Officers (CIOs) in the region are facing challenges in making IT systems work seamlessly across borders.

At the recent SOFTEC Asia 2013 that was held from the 2nd to 5th September at Sunway Resort Hotel and Spa, CIOs were presented with an opportunity to share about these challenges through a CIO Roundtable event which discussed software quality perspectives for C-Level business executives and its ROI propositions.

SOFTEC Asia 2013, a regional-level conference on software testing was organised by the Malaysian Software Testing Board (MSTB) under the auspices of the Malaysia Software Testing Hub (MSTH) initiative, a public-private collaboration to develop a new source of economic growth for the nation.

(L-R) Puan Azizah Hamzah, Director K-Economy, Economic Planning Unit (EPU), Prime Minister’s Department;Puan Mastura Abu Samah, President of Malaysian Software Testing Board (MSTB);Yang Berbahagia Senator Dato' Seri Abdul Wahid Omar, Minister in the Prime Minister’s Department;Yang Berusaha En. K. Yogeesvaran, Deputy Director-general, Economic Planning Unit, Prime Minister’s Department;Encik Amiruddin Jaafar Sidek, Director, Malaysian Software Testing Board (MSTB)

SOFTEC Asia 2013, meanwhile, was officially opened by Minister in the Prime Minister's Department Dato' Seri Abdul Wahid Omar. SOFTEC Asia 2013 is being held at the Sunway Resort Hotel and Spa from 2nd to 5th September.

Monday, September 02, 2013

ICT Happening Updates Week 1 of Sep 2013

The most significant news for Week 5 of Aug 2013 was the announcement of the planned retirement of Microsoft CEO, Steve Ballmer.

For this week / last week, here are / were the biggest news.
  • WD expands NAS HD with World's First 2.5" WD RED.
  • Reuters: Microsoft to buy Nokia's phone business for 5.44 billion euros.
  • CrimsonLogic appoints Saw Ken Wye as CEO.
  • Ericsson to build three global ICT centers.
  • Ninetology launches its Flagship Touch Point at Plaza Low Yat.
  • Reuters: Worldwide PC shipments to fall 9.7% this year.
  • ExactView released flagship Mobile App.
  • Reuters: China to become e-commerce market leader in a decade.
  • Ericsson ConsumerLab: Place-shifting newest TV and video viewing habit.

Computer Security Updates Week 1 of Sep 2013

Refer to Computer Security Updates Week 5 of Aug 2013; the biggest news was Yahoo reported that China to probe big IT firms after Snowden leaks.

For this week / last week, here are / were the biggest news.
  • Kaspersky: NetTraveler is back with new tricks.
  • USA Today: NSA uses supercomputers to crack Web encryption, files show.
  • Symantec: G20 Summit used as bait to deliver Backdoor.Darkmoon.
  • Symantec: Cynical spammers exploit deepening Syria crisis.
  • Fortinet Blog: Implementing Wireless Security.
  • Reuters: New York Times, Twitter hacked by Syrian group.
  • Eset Blog: Mobile banking apps pose “serious” safety risks, financial watchdog warns.
  • HP helps enterprises accelerate software security assessment, assurance and protection.
  • Yahoo News: Facebook says no to Putrajaya’s request for details on 197 users.
  • Trend Micro's 'Trend Ready' Cloud Security Verification Program gains momentum.

Friday, August 30, 2013

WeChat launches on BlackBerry 10 OS

Kuala Lumpur, 28 August 2013 – According to the Mobile Internet Consumer Report 2013, the mobile Internet industry is a young industry where users in SEA consist of 50% of below 24 years of age - it is evergreen and vibrant due to teenagers moving up the age ladder.

On Jan 2013, Tencent announced WeChat 1.0 For RIM's Blackberry - a simplified version of WeChat.

Today, Tencent announced the launch of WeChat for the new BlackBerry® 10 OS platform.

Designed for the re-invented and re-engineered BlackBerry 10 OS platform, WeChat for BlackBerry 10 integrates with BlackBerry Hub providing a seamless user experience. Free to download, the app allows users to text each other, swap voice messages with its “Hold to Talk” feature, and share images. Included in WeChat for BlackBerry 10 are animated emoticons and the location-based service to meet and find new friends.