Google Analytics

Search This Blog

Tuesday, December 31, 2013

McAfee Cyber security forecasts for 2014

Press release - Dec 30, 2013

Today, McAfee Labs released its annual 2014 Predictions Report, analyzing 2013 trends through its proprietary McAfee Global Threat Intelligence (GTI) service to forecast the threat landscape for 2014.

In the upcoming year, McAfee Labs expects to see the rapidly growing mobile platform draw the lion’s share of threat innovation, with ransomware expected to proliferate on mobile devices.

McAfee Labs also predicts that attacks using advanced evasion techniques will come of age, and social platforms will be used more aggressively to target the finances and personal information of consumers, and the intellectual property and trade secrets of business leaders.

Here are some of the main trends McAfee Labs foresees in 2014:
  • Mobile malware will be the driver of growth in both technical innovation and the volume of attacks in the overall malware “market” in 2014
  • Virtual currencies will fuel malicious ransomware attacks around the world
  • In the spy vs. spy world of cybercrime and cyber warfare, criminal gangs and state actors will deploy new stealth attacks that will be harder than ever to identify and stop
  • “Social attacks” will be ubiquitous by the end of 2014
  • New PC and server attacks will target vulnerabilities above and below the operating system
  • The evolving threat landscape will dictate adoption of big data security analytics to meet detection and performance requirements
  • Deployment of cloud-based corporate applications will create new attack surfaces that will be exploited by cybercriminals

Tuesday, December 24, 2013

Developers Updates Week 4 of Oct 2013

In the last updates series (Week 3 of Oct 2013), the most interesting update was the C++ compiler for Android by Intel.

For this updates series, the followings had emerged.
  • MathWorks - Dec 24, 2013 - Developing In-Vehicle Traffic Jam Alleviation Technology for Android Using Simulink
  • MSDN - Dec 20, 2013 - 500 more slots now available in the Kinect for Windows v2 Developer Preview Program
  • Press release - Dec 20, 2013 - GAME JAM 2013 Winners Attend Japan Game Development Research Tour
  • Press release - Dec 20, 2013 - Oracle SQL Developer 4.0 Enhances Support for Oracle Database 12c
  • Press release - Dec 13, 2013 - Juniper Unveils Junos® Pulse AppConnect SDK
  • Caltech - Oct 22, 2013 - DNA molecules as a computing substrate to solve a hard math problem.
  • Intel - Oct 22, 2013 - Intel® XDK New HTML5 Cross-platform Toolkit
  • Press release - Oct 22, 2013- Intel Capital Unveils $65 Million in New Investments at 14th Annual Intel Capital Global Summit
  • Press release - Oct 17, 2013 - Ericsson Application Awards 2014
  • Press release - Oct 18, 2013 - Huawei Launches ‘MBB Insider Online' Platform for Next-Gen Mobile App Developers

Where milliseconds matter: low latency networks going mainstream

By Henry Bohannon, Senior Director, Head of Ethernet Product Management, Tata Communications

While the standard communications network is designed to offer a competitive cost structure, low latency networks have turned this model upside down: speed takes priority over cost.

Financial firms used to be the sole users of low latency networks. Financial firms generate revenue from the purpose built, low latency networks through arbitrage created between markets with electronic trading. Low latency links have been designed to provide the fastest possible speeds between electronic trading locations, allowing execution of trades between exchanges in milliseconds. Financial firms take advantage of the difference in the buy and sell price on different exchanges. The difference in the buy and sell price is extremely small, but by trading in large volumes, the firms can earn millions of dollars every day.

While firms in the banking, financial services and insurance industry segments are the primary users of low latency applications, other companies are now ready to pay a premium for the improved performance. This improved performance, between specific locations, delivers benefits that outweigh the higher cost. Low latency networks are of interest to pharmaceutical companies, IT organisations, cloud service providers and content delivery specialists. These are companies which are running business-critical applications or revenue critical applications which will not work optimally on networks with high latencies. It is no longer a simple binary question of an application working or not, but an investment in the network latency performance can deliver direct business benefits through improved application performance.

Computer Security Updates Week 4 of Dec 2013

Refer to Computer Security Updates Week 2 of Dec 2013; the biggest news was a report by USA Today that hackers stole almost 1.6 million login credentials and 320,000 e-mail credentials.

For this week / last week, here are / were the biggest news.
  • Press release - Dec 24, 2013 - Accor Hotels Chooses McAfee Next-Gen Firewall for Secure Connections Worldwide
  • Press release- Dec 20, 2013 - Prolexic Opens North Pole DDoS Scrubbing Center.
  • USA Today - Dec 18, 2013 - Tech leaders dialogued with US President on NSA surveillance issues.
  • Press release, Dec 13, 2013 - Kaspersky Academy is calling for innovations
  • Press release, Dec 12, 2013 - Fake Twitter users on the rise; Cost becomes more affordable
  • Press release - Dec 10, 2013 - Kaspersky Internet Security shows great performance in AV- Comparatives testing
  • Dec 10, 2013 - Symantec: Creepware analysis
  • Dec 8, 2013 - Trend Micro 2014 predictions

Monday, December 23, 2013

Kaspersky Lab makes its forecasts for the coming year - 2014

By Kaspersky Lab.

Kaspersky Lab’s experts have made their predictions about 2014. Not surprisingly, much of what they have seen in their crystal balls is connected to the fall-out from Edward Snowden’s revelations.

1.)End user forecast

Cybercriminals will target...

1.1) your privacy

After the Snowden scandal of 2013, people are determined to keep their private life under wraps despite the attentions of intelligence agencies around the world. That means protecting the information stored on their computers and devices and ensuring their online behavior remains confidential. This will lead to greater popularity for VPN services and Tor-anonymizers as well as increased demand for local encryption tools.

1.2)your money

In 2014, Kaspersky Lab’s experts expect cybercriminals to continue developing tools to steal cash – directly or indirectly. To plunder pockets directly, the fraudsters will further refine their tools designed to access the bank accounts of mobile device owners (mobile phishing, banking Trojans). Mobile botnets will be bought and sold and will also be used to distribute malicious attachments on behalf of third parties. To support indirect thefts, it is likely that we will see more sophisticated versions of the Trojans which encrypt the data on mobile devices, preventing access to photos, contacts and correspondence until a decryption fee is handed over. Android-based smartphones will no doubt be the first to be targeted.

1.3) your Bitcoins

In 2014 Kaspersky Lab’s experts expect considerable growth in the number of attacks targeting Bitcoin users’ wallets, Bitcoin pools and stock exchanges. Find out how to keep your Bitcoins safe here.

Groupon Malaysia Raises RM 271,125 for Typhoon Haiyan Victims

Press release - KUALA LUMPUR, 17 Dec, 2013

Groupon Malaysia has recently presented a cheque worth RM271,125 to the Malaysian Red Crescent Society (MRC) in aid of the victims of Typhoon Haiyan in the Phillippines.

Present at the cheque presentation ceremony were Datuk Haji Dr. Noordin bin Ab. Razak, National Vice Chairman & Secretary General of Malaysian Red Crescent, Rafiq Razali, Country Head of Groupon Malaysia, Yeoh Chen Chow, Regional Operations Director of Groupon APAC and Jon Wild, Head of Marketing of Groupon Asia Pacific.

Friday, December 20, 2013

Malaysian Search: Google's Top Searches of 2013

Press release - Kuala Lumpur, December 17, 2013

Today, Google announced its annual Year End Zeitgeist, a look at 2013 through the collective eyes of the world on the web, offering a unique perspective on the year's major events and hottest trends based on searches conducted in Malaysia.

Malaysia’s Trending Queries of 201:
  • Lahad Datu
  • SKMM
  • Keputusan PRU13
  • Setia Hujung Nyawa
  • Gwiyomi
  • Teduhan Kasih
  • Malindo Air
  • WeChat
  • The Conjuring
  • Cinta Jannah


Thursday, December 19, 2013

Fantasy Premier League Best Kept Secret

By FanXT

When someone mentions a fantasy commissioner game, you’d probably think of American sports - English Premier League (EPL) may not be the first to pop up on your mind. Not to worry, you’re not the only one. Fantasy Premier League Commissioner is a relative newcomer in the scene, breaking out of American markets to cater to the large and still fast-growing user base in fantasy football (soccer) games. Yet, it had already garnered quite a following, with positive reviews from EPL Talk and, just to mention a few.

In fact, fantasy EPL managers are really missing out if they aren’t already on the game. The commissioner system offers highly customizable features not found in any other fantasy game for EPL:

1. A unique league URL and customized interface

The commissioner system offers each league its own subdomain, so users can easily share their league details, in addition to having a sense of ownership of the league. They can also enhance their league with unique logo and banner, colour theme and site background.

2. Adjust league settings

Users are given leeway to set the transfer limits and overall budget to suit their members’ tastes and experience levels, even decide upon the start of the league.

ICT Happenings Week 3 of Dec 2013

News for Week 5 of Oct 2013; nothing spectacular.

For this week / last week, here are / were the biggest news.
  • Press release - Dec 20, 2013 -SonicGear introduces the Pandora series.
  • Press release - Dec 19, 2013 - Fujitsu Unveils Brand New Leasing Programme for Businesses
  • Press release - Dec 19, 2013 - Royal Air Force Museum introduces German Dornier Do 17
  • Press release - Dec 19, 2013 - New Nokia Lumia 525 will be in stores tomorrow (20 Dec 2013)
  • Press release - Dec 18, 2013 - WFT Cloud Surpasses a Key Milestone of over 300 Customers using its SAP Cloud Hosting Platform
  • Press release - Dec 18, 2013 - Aspect Software Announces Zipwire Contact Centre Solution
  • Press release - Dec 18, 2013 - Symantec releases Storage Foundation 6.1
  • Press release - Dec 16, 2013 - Oracle Launches Oracle Exadata Database Machine X4
  • Press release - Dec. 16, 2013 - SAP Innovates With New Release of SAP Business ByDesign® Solution
  • USA Today - Dec 14, 2013 - China soft landed rover on the moon
  • Press release - Dec 13, 2013 - Exabytes 20Mbps Dedicated Server
  • Press release - Dec 12, 2013 - Virus Wu Named as Electro-Voice Ambassador
  • Press release - Dec 12, 2013 - SMEs Usher in New Era of Business Productivity in Singapore
  • Press release - Dec 10, 2013 - Viber Launches ‘Viber Out’ Worldwide
  • Press release - Dec 9, 2013 - ADCA to Offer Multiple City-Connectivity 
  • Press release - Dec 9, 2013 - Lazada Ends 2013 with the Online Revolution Blitz and a Brand New Look.
  • Press release - IBM - Dec 6, 2013 - Made in IBM Labs: Helping Clients Securely and Reliably Migrate Cloud Data.
  • Press release - Dec 6, 2013 - MOLPay as payment gateway for .my domain mapping platform
  • Press release - Dec 5, 2013 - travelmob launches iOS app to further expand its reach in the Asia Pacific region
  • Press release - Dec 5, 2013 - Silver Peak Unveils Dynamic Path Control to Optimize Hybrid WANs
  • Press release - Dec 5, 2013 - Tata Comm. named Best Wholesale Carrier at World Communications Awards 2013.

Wednesday, December 11, 2013

Sophos Threat Report 2014

Press release - Dec 11, 2013

Sophos today released its latest Security Threat Report. The report outlines trends for 2013 and prediction for 2014. For year 2013, cyber criminals continued the theme of professionalization of their ‘industry’, offering easy to buy and use services that amplified the scale of cyber crime to never before seen levels.

In the comprehensive reports, please pay attention to a few key highlights of 2013:

1.) Malware evovled in 2013

2.) Botnets Grew in size and stealth

3.) Android Malware mutated and got smarter

4.) Linux attracted criminals - large numbers of malicious PHP scripts that inherited features of botnet were detected

5.) Many small attacks on Mac OS X platform

6.) Web-based malware became more sophisticated, diverse and hidden

7.) APTs on Financial industry

Symantec: Mobile Adware and Malware Trends

By Symantec.

According to a research paper by Symantec, here are the latest mobile Adware and Malware trends:
  • Percentage of “madware” (overly-aggressive mobile adware) on Google Play steadily increasing – Twenty-three percent of all apps in the Google Play store this year contained aggressive ad libraries, compared to 15 percent in 2012.
  • The aggressive actions “madware” (overly-aggressive mobile adware) can take – Two-thirds of madware apps collect device information, such as its IMEI number or phone producer and model. Additionally, a third of madware apps display ads in the notification bar, which can annoy users.
  • Android malware continues to grow exponentially - Between June 2012 and June 2013, the number of known malware families increased by 69 percent, and known malware samples increased nearly four times.

Tuesday, December 10, 2013

Avnet Malaysia Outlines Its SAP® Offerings Strategy

Press release - Dec 10, 2013

Avnet Malaysia today announces its SAP business strategy for Malaysian market. Here is a quick summary of the announcement.

1. New alliance with SAP is aligned with the company’s local strategy to expand its middleware products portfolio targeting financial services industry (FSI) and mid-range small and medium enterprise (SME) commercial markets in the country. Currently, Avnet is involved in several SAP-related IT implementation projects in the Malaysian government sector.

GM of Avnet Technology Solutions, Malaysia

2. This move is expected to strategically expand SAP’s existing database and technology solutions customer base in Malaysia. - Avnet Malaysia’s strategy is to fill this gap by offering SAP analytical and converged infrastructure capabilities especially targeting the underserved market of unconventional and non-SAP-based enterprise software customers via channel partners.

3. The partnership with SAP is also timely for Avnet to embark on the new opportunities that presents on Malaysia's GST policy implementation.

Hence, basically what this means is Avnet is now carrying SAP as its products and services offering - and the potential is huge.

On Aug 2013, Avnet  signed up as distributor for Red Hat.


Kaspersky 2013 Cyber Security Overview

Press release - Kaspersky - Dec 5, 2013

Worldwide landscape trends recorded:
  • Exposure of cyber-espionage related activities involving government agencies
  • New “old” cyber-espionage campaigns live on - Red October, NetTraveler, IceFog and MiniDuke
  • Bitcoins used heavily for cyber-espionage and cyber-terrorism activities

Enterprise trends recorded:
  • Spyware-led attacks related to various governments were revealed
  • Most cybercriminal incidents were aimed at stealing information
  • Attacks on contractors were identified, instead of reaching big organizations
  • New actor on the APT stage appeared: cyber-mercenaries conducting cyber-espionage on demand

A survey conducted by Kaspersky Lab and B2B International found that 91% of the organizations polled suffered a cyber-attack at least once in the preceding 12-month period, while 9% were the victims of targeted attack.


Monday, December 09, 2013

Computer Security Updates Week 2 of Dec 2013

We are back after some period of hiatus - this update is going to be a massive one.

Refer to Computer Security Updates Week 4 of Oct 2013; the biggest news was a report by USA Today about the shutdown of Silk Road by FBI.

For this week / last week, here are / were the biggest news.
  • Yahoo, Bernama - Dec 6, 2013 - Hundreds of millions swindled from banks in past 5 years, mostly by staff, say police
  • Press release - McAfee - Dec 5, 2013 - McAfee Finds 80% of Employees User Unapproved Apps at Work
  • USA Today - Dec 5, 2013 - Hackers stole almost 1.6 million login credentials and 320,000 e-mail credentials
  • Press release - Prolexic - Dec 2, 2013 - Akamai to Acquire Prolexic.
  • Press release - Prolexic - Nov 20, 2013 - Survey Results for DDoS Protection
  • Press release - Trend Micro - Nov 16, 2013 - Reports Cyber crimes from Nigeria.
  • Press release - Trend Micro - Nov 14, 2013 - Microsoft Releases 8 Security Advisories
  • Yahoo - Nov 3, 2013 - Philippine government sites hacked by Anonymous
  • USA Today - Oct 31, 2013 - Reports claimed that major Internet players' Data Centers were intercepted
  • Press release - IBM - Oct 18, 2013 - Made in IBM Labs: Two-Factor Security for Mobile Transactions.
  • Press Release - Huawei - Oct 18 2013 - Huawei Releases Cyber Security White Paper.

Sunday, December 08, 2013

Choosing the Right Mobile Broadband Plan

By, Malaysia’s largest and most comprehensive financial comparison site.

Broadband has already made a lot of breakthroughs in the tech industry. Who would have thought that a small dongle could carry a very strong connection? It has already made people become more efficient and productive. Internet has gone through an exciting transition, from dial-ups day up to mobile broadband portability and quick access.

How to Choose?

Choosing the best broadband plan can be a bit challenging, especially with so many features that ISPs offer. In choosing the right broadband plan, there are things that have to be considered:
  • Data- The amount of data depends on the actual usage of the subscriber. Users who are into gaming and streaming should get plans with higher connection speeds. Users who simply wish to browse and check emails, on the other hand, should get standard broadband plans.
  • Coverage- The area must be covered well by the internet provider to get the right speed.
  • Price- This will also depend on the usage of the subscriber. It is best to check the broadband packages that correspond with usage.

Saturday, December 07, 2013

Juniper Terminal Services Client Stopped Working Suddenly

Juniper Terminal Services Client is a software for VPN access provided by Juniper Networks.

I encountered issue when it suddenly stopped working properly two days ago.

I began to realize that it was due to some Windows updates which happened three days ago. After checking out the Windows updates history, I found that I had installed Internet Explorer 11 during that time and I knew I couldn't be more right.

It seems like upgrading to IE 11 had caused this issue - tested with other PC with IE 6 and it worked normally.

This web site suggests that Juniper Terminal Services Client is only supported by the following web browsers:
  • Microsoft® Internet Explorer 6.0 SP1 and above on Windows®
  • Mozilla Firefox 1.5 and above on Windows and Linux®

Hence, since currently I am using Firefox version 26.0 and I have no reason to downgrade, I figure that it would be a much worthy effort to download my Internet Explorer to previous version by uninstalling the updates I did three days ago and guess what ?  I managed to get Juniper Terminal Services Client come back working.