Tuesday, April 21, 2009

Is It Safe Now?...

IF you think your PC is safe, think again! Rising online threats spell dangers. More protective measures are needed.

insidepix1


Tan says the question is no longer about how safe the computer is, but about how well-protected, managed and controlled the information is today.
Tan says the question is no longer about how safe the computer is, but about how well-protected, managed and controlled the information is today.

Cyber attackers use new ways to gain control

BAD news for computer users! Cyber attackers are employing new and more sophisticated techniques, and no longer limited to intrusions, viruses, worms, spam and phishing.

According to Symantec Corporation (Malaysia) managing director Suzie Tan, among the newer techniques are bots, Web-based attacks and spim – unsolicited messages sent to cellular phones.

“As security measures are developed and implemented to protect the computers of end-users and organisations, attackers are rapidly adapting new techniques and strategies to avoid them.”

Tan said the changing threat landscape has led to the emergence of Security 2.0, the next generation of security centred on protecting and managing information.

“So, the question is no longer about how safe the computer is, but about how well-protected, managed and controlled the information is today.”

In addition to the said threats, the explosion of new malware variants has resulted in the shift from mass distribution of a small number of threats to micro distribution of large families of threats. These new strains of malware consist of millions of distinct threats that propagate as a single, core piece of malware creating an unlimited number of unique malware instances.

“One of the more recent examples include the Conficker worm, sometimes called Downadup. A number of different variants have been disclosed over the past three months, whereby the worm has created an infrastructure that its creators can use to remotely install software on infected machines.”

Inadequate protection measures open the computers to the risk of attack and the consequences are costly.

According to a research from the Ponemon Institute, an independent research firm specialising in privacy, data protection and information security policy, the cost of a data breach is at nearly US$200 (RM720) per compromised record.

From a business perspective, such incidents do not only result in extra expenses to recuperate from downtime and IT systems failure, which will affect productivity, but also introduce serious legal liability issues and undermine hard-earned corporate brands and reputation.

Tan advises businesses to strengthen their priority and maintain their investment on security infrastructure in the organisation.

“The least they can do is to employ in-depth defence strategies, which include the deployment of regularly updated anti-virus, firewalls, intrusion detection, and intrusion protection systems on client systems.

How to keep your system safe
1 Unless you’re absolutely certain a site is legitimate and secure, don’t provide personal or financial information such as your IC number or bank details online. Even on Web sites that appear to be legitimate, they may be fake or “phishing” sites that exist only to steal your information. Never send such information through e-mail or instant message either.

2 Always use secure Web sites when sending information or transacting business online.

3 Do not visit suspicious Web sites, click on suspicious links or open attachments, unless you know for sure they are trustworthy.

4 Store sensitive financial and personal information in password-protected files and directories; use strong, non-obvious passwords.

5 Don’t open e-mail attachments from persons you don’t know or trust.

6 Regularly download all browser and security updates to keep your security protection safe – anti-virus, firewall.

7 Install a good firewall protection, anti-virus software, and anti-spam or anti-phishing filter. A programme with anti-virus and anti-spyware capabilities can detect and often remove crimeware threats that would otherwise remain hidden on your machine.

8 Educate yourself. Check out the latest threats, spyware and adware, security advisories, and recent security news.

Singapore, Thailand hit more often than Malaysia



According to the latest Symantec Asia-Pacific and Japan (APJ) Internet Security Threat Report XIV, which observed current trends and impending threats for 2008, a total of 2,075,968 distinct bot-infected computers were identified in the APJ region, which amounts to 22 per cent of the 9,437,536 distinct bot-infected computers detected worldwide during this period. It is, however, 21 per cent less than the 2,628,906 distinct bot-infected computers that were identified in the region during 2007.

In 2008, Malaysia ranked third in Southeast Asia (behind Singapore and Thailand) for country with the highest bot-infected computers, and ranked ninth in APJ. Malaysia’s ranking has improved significantly from the top ranking in Southeast Asia, and sixth ranking in APJ in 2007. (See Table)

Know your enemy ...experts tell you how to protect your PC

Online threats are real and dangerous. But how do they emerge and how do you minimise your risks? Siti Syameen Md Khalili talks to a number of computer security solutions providers and experts on the subject.

• Lim Kar Aik, chief executive officer, Avira Sdn Bhd

The computer can be infected by a mere click on a Web site. Virus, worms and Trojans spread through your office network, Internet, or even the flash drive.

Users who are most vulnerable to threats are those closely related to financial gains. For instance, hackers might use a phishing technique to “fish” or to tempt online banking users to key in their bank account’s log in detail and password by creating a similar Web page that looks exactly the same with the real one.

The threats depend on the behaviour of the virus itself. Some could be really harmful to your computer and might cost you a new hard drive or even a new motherboard. Recently, the famous Conficker C worm hits the Internet and has so far infected more than 10 millions PC around the world.

Users thus need to make their computers safe and secure by choosing reliable anti-virus solutions.

Locally, our end-user anti-virus solution, Antivir Personal Edition, has protected more than one million PCs.

Anti-virus software is affordable nowadays and we encourage people to install it. They should watch out what they surf to and pay attention on what to click and what not to.

• Victor Lo, regional consulting manager, Trend Micro (Southeast Asia & Hong Kong)

The computer on its own is safe, but risks emerge once the user hooks it onto the network.

The Internet is where anything can take place, both good and bad. Even if the computer has a security software in place, it would depend on what level and type of security the software covers.

Specific online activities are vulnerable to different types of viruses, malware and threats. For companies, being vulnerable to threats means being at the risk of losing valuable data, consumer database, passwords and the risk of living through operational downtime and clogged bandwidth (via spam).

Downtime is a costly price to pay for ignoring protective measures. This kind of losses is purely monetary and is completely at the cost of the company’s budget.

For consumers, the threat lies in losing essential information and passwords, which result in monetary and privacy loss.

More than that, during this Age when Internet banking and bill payment transactions have become a daily norm, mirror sites by hackers, spyware and phishing activities can steal a person’s personal data such as name, address and passwords. Also, the number of Internet users is booming and children are targeted by online criminals.

Hence, Trend Micro has a new initiative – Internet Safety for Families & Kids (ISKF) through which we try to create awareness of the risks and solutions for children’s safety online.

Besides that, our end-user solution, Trend Micro Internet Security 2009, is designed to protect several PCs in a household and PC activities can be managed from a parent PC. It offers network protection against online intruders.

• Dhillon Andrew Kannabhiran, founder/CEO, Hack in The Box (M) Sdn Bhd

“The risks associated with computer usage are increasing. In the past, attacks were more focused on the network layer. Today, the focus has moved to the application layer. With Web 2.0 the driving force behind this adoption, users are now not only exposed to network-based attacks but also to attacks that come in through their Web browser ranging from cross site scripting, cookie-injection and click-jacking.

Threats spanning from frequent online activities:
• E-mail – viruses/Trojans/worms
• Instant messaging – spam/phishing
• Online shopping – spyware/adware
• Online banking – viruses/Trojans/worms
• Personal finance – Crimeware (password theft which leads to financial loss)
• Downloading of music, movies and software – spyware/adware/phishing
• Online gaming – viruses/Trojans/worms
• Post on blogs and Wikis – crimeware
• Digital photography (upload/download free photos) – spyware/adware/phishing/ viruses/Trojans/worms/crimeware
• Internet surfing – spyware/adware/ phishing
• Online research and travel – spyware/ phishing/viruses/Trojan/worms/ crimeware


Sources - New Straits Time ( I-Tech )

Wednesday, April 15, 2009

Insomnia?...

Insomnia Causes

Insomnia may be caused by a host of different reasons. These causes may be divided into situational factors, medical or psychiatric conditions, or primary sleep problems. Insomnia could also be classified by the duration of the symptoms into transient, short-term, or chronic. Transient insomnia generally last less than seven days; short-term insomnia usually lasts for about one to three weeks, and chronic insomnia lasts for more than three weeks.

Many of the causes of transient and short-term insomnia are similar and they include:

  • Jet lag

  • Changes in shift work

  • Excessive or unpleasant noise

  • Uncomfortable room temperature (too hot or too cold)

  • Stressful situations in life (exam preparation, loss of a loved one, unemployment, divorce, or separation)

  • Presence of an acute medical or surgical illness or hospitalization

  • Withdrawal from drug, alcohol, sedative, or stimulant medications

  • Insomnia related to high altitude (mountains)

Chronic or long-term insomnia

The majority of causes of chronic or long-term insomnia are usually linked to an underlying psychiatric or physiologic (medical) condition.

Psychological related insomnia

The most common psychological problems that may lead to insomnia include:

In fact, insomnia may be an indicator of depression. Many people will have insomnia during the acute phases of a mental illness.

Physiological related insomnia

Physiological causes span from circadian rhythm disorders (disturbance of the biological clock), sleep-wake imbalance, to a variety of medical conditions. The following are the most common medical conditions that trigger insomnia:

High risk groups for insomnia

In addition to the above medical conditions, certain groups may be at higher risk for developing insomnia:

Medication related insomnia

Certain medications have also been associated with insomnia. Among them are:

  • Certain over-the-counter cold and asthma preparations.

  • The prescription varieties of these medications may also contain stimulants and thus produce similar effects on sleep.

  • Certain medications for high blood pressure have also been associated with poor sleep.

  • Some medications used to treat depression, anxiety, and schizophrenia.

Other causes of insomnia

  • Common stimulants associated with poor sleep include caffeine and nicotine. You should consider not only restricting caffeine and nicotine use in the hours immediately before bedtime but also limiting your total daily intake.

  • People often use alcohol to help induce sleep, as a nightcap. However, it is a poor choice. Alcohol is associated with sleep disruption and creates a sense of nonrefreshed sleep in the morning.

  • A disruptive bed partner with loud snoring or periodic leg movements also may impair your ability to get a good night's sleep.
Tuesday, April 14, 2009

Notebook Batery Life Problem..How to Solve?.

Wouldn’t it be perfect if there is a notebook computer that weighs less than a kilogram and has a battery life that never ceases? Imagine carrying it around while travelling without needing to charge the notebook after every few hours.

Both the Lenovo X200 (top) and Dell E6400 offer long-lasting battery power.
Both the Lenovo X200 (top) and Dell E6400 offer long-lasting battery power.

For now, ultra-mobile PCs (UMPC) seem to fit most mobile professionals’ need for portability, but not so much the dream of having everlasting battery to keep them productive on the go.

Well, some might argue that the eight hours of battery life offered by some of the latest UMPC models is good enough. Still, wouldn’t it be useful to have the battery lasting longer, especially when you are a heavy multimedia user? Computer usage habits make a difference on battery life, so you might not experience the same battery life as promised by the manufacturer.

Battery life remains one of the key concerns for notebook users, and manufacturers are trying hard to feed the need to keep batteries running for a long time after each charge.

The majority of notebooks in the market are pre-loaded with power management software. This feature works with Windows’ (XP and Vista) power management utility to conserve energy and extend battery life. Users just need to create a power plan and get the right balance of performance and battery life. There is also the option of throttling central processing unit speed to conserve energy.

Leading the way in providing batteries that offer fast charging and long life is Dell Computers. For now, Dell’s latest 14.1-inch Latitude E6400 has the longest battery life of 19 hours if you combine a nine-cell battery with the optional 12-cell battery. The provided nine-cell battery on its own can last about five hours.

Another model offering long-lasting battery power is the 12-inch Lenovo X200. This machine, equipped with enhanced battery stretch feature, promises 9.2 hours of battery life.

In the UMPC category, Asus Tech offers the Eee PC 901 and 1000 with six-cell batteries which provide a longer battery lifespan of up to 7.8 hours.

As competition gets hotter, the battery factor could well be decisive in enabling a brand to gain more grounds in the PC market.