Phishing issues

In this modern internet world, almost everyone is using email instead of normal snail mail for any correspondence and communication with all parties including bank, office, government agencies, school, university, education groups and payment company.

Even though almost everyone understand how to send and receive email but not many are aware about cyberspace security phishing attack launched by the cyber criminals.

Phishing detection can be classified into 2 natures namely server-based technique and client-based technique. Server-based techniques typically are implemented by service providers, e.g.: The internet service provider [ISP] like TEKEKOM, TM, REDTONE, MYKRIS, e-commerce stores and other financial institutions e.g.: commercial bank and centre bank.

Client-based techniques are implemented at the users’ end point through browser plug-ins or emails analysis. These techniques can be divided into 2 categories which are email level approaches, includes authentication and content filtering and browser integrated tools, which usually use URL blacklists, or use webpage content analysis.

We need to learn how to protect ourselves from phishing attack so that we will not be hurt in terms of financial losses and emotional disturbance in a long run.

Advertisements

Cyberspace security problem for online transactions and payment system

Currently, billions of people are using online payment system and doing online transactions everyday. The cyberspace criminals are following up closely on this new technology and trying their luck to hack into the system to steal money from it.

According to UK researchers, the financial fraud loses related to bank accounts totall 768.8 million pound in 2016, out of these cases, 80% are originated from payment card fraud. The cyber crimes getting more and more out of control in cyberspace world. online users must be more vigilant and careful in handing online transactions and banking so that they will not victimized by the cyberspace criminals. Because of internet, cyber criminals have no limits, no boundaries, no rules and nothing can stop them. so we need to practice better security precaution and countermeasures to protect ourselves and not let them win. credit card details and personally identifiable information remain highly desirable in the payments underworld. criminals also target login credentials. so keep your password secret and change it regularly to avoid being detected and misused.

 

 

 

 

Smartphone Generation

Many people call the everything internet, everything smartphone Generation Z, some named them iGen. No matter what name you give them, they are the new generation who use smartphone to do everything including : watching TV, watching movies, dating, email, apply job, banking, business, order food, studying, learning everything and making friends.

What makes iGen different? They are kids who cannot live without a smartphone, who addicted to smartphone and using it > 3 hours a day. They use it for every easpect of their lives. They spend a lot of time on the internet, texting friends, enjoying music, and wondering at social media and they have less time for anything else.

Unfortunately, some of the iGen experiencing negative side of playing too much smartphone, including : depression, addiction, anxiety, loneliness, anger and fear which have shot upward since year 2010, with happiness, self confidence and joy declining.

Parents, spend more time with your children, because if you do not do it, someone else at virtual world will do it for you and who know, what kind of influence this group of people can do to your children?

Will Robots replace humans one day?

Recently, people is frequently discuss about AI, BI and Robots. The hottest ICT topic in town is about how robots can work, talk, smile, sing and act like real human being and one day, may take over most of the repeatative jobs which are currently done by humans. According to experts, robots will take over 30% of our jobs within the next 10 to 20 years. Incrasing numbers of businesses are now substituting workers with automated software and robots to perform a myriad of structured, routine administrative and clerical tasks which do not reply on human mental judgement.

According to USA researchers, two-thirds of Americans believe robots will soon perform most of the work done by humans but 80% believed their jobs will not be affected at all.

Most of the jobs that fall into the higher risk category are high volume, highly repetitive and not suited to humans, who always make erros, mistakes where robtos do not, according to Leslie Willcocks, Professor of Technology, work and globalisation within LSE’s Department of Management. Top management of big company related to healthcare, tehnology, food industry, restaurants, education and retail prefer to use robot rather than human in handling customer service and repeatative tasks which difficult to get the right person to do it.

According to professor Willcocks, robots are perfect in doing repetitive tasks tirelessly and continuously. In many businesses, robots are welcomed as valuable team members who do not complaints about high volume of jobs and no rest, and always willing to do tasks that the humans refused and complainted about. For example, in USA, some McDonald’s restaurant started to use kiosk to serve customers instead of waiter or waitress or cashiers. The patrons need to create their own order list using touch-screen system that allows them to create their own burgers without interacting with any staff. It is unknown how many jobs like this, are being replaced by automated kiosks but such innovations will be an increasingly familiar sight in the whole USA and worldwide soon.

The fears around robots replacing humans need to be tempered with the reality that new jobs, e.g.: programming job, coding jobs uing AI and ML, will be created by this new trend, accoridng to researchers.

Many of us recognize robotic automation as an inevitably diruptive force. For example, in Australia company Fastbrick Rotbotics has developed a robot, the Hadrian X, that can lay 1000 standard bricks in one hour, a task taht would take 2 human bricklayers the better part of a day or longer to complete the same tasks.

In a recent report, the world economic forum predicted that robotic automation will result in the net loss of > 5,000,000 jobs across 15 developed countries by 2020. Another research study, conducted by the International Labor ORganization, states that as many as 137,000,000 of workers across Asia countries including Cambodia, Indonesia, Philipines, Thailand and Vietnam, about 56% of the total workfoce will be at risk of displacement by robots especially workers in the garment manufacturing industry.

What say you?

Generation Y and their use of social media and internet

Generation Y are younger generation who born between 1980s – 1990s..Childen born as Gen Y have constant access to new technology in their childhood and youth, they do almost everything using google, website, social media, e-transactions and computer technology. They are internet generation. This generation refused to do anything manually like their Generation X parents as they think these are outdated and obsolete methods to manage things, events, issues, education, transactions, work and everything.

According to statistic, Gen Y in average, online for > 3 hours a day and everyday in Malaysia. For other developed countries, Gen Y ages 18 to 36 spend an average of 17.8 hours a day using social media and internet. 71% of them said they engaged in social media daily.

For the business and government worldwide, they will not be able to engage with this Gen Y if they do not put extra effort to make their present exist in internet, social media, website and applications. These generations normally do not read anything exist in old fashion hardcopy format, e.g.: newspapers, magazines, newsletters, notice boards and books. All they want is everything in digital format, available at website and able to find using internet browser or applications.

If you are selling something which Gen Y cannot find at e-shopping malls or e-shop, the chances are this product will not do well and will be out of the market soon. This explain how important business owner and enterpreneurs who born as Gen X or older generation to change their old fashion mindset and to adapt and adopt internet technologies inlcuding AI, BI, e-commerce and cloud computing. Gen Y have grown up with IT, they are accustomed to stimulation i nthe form of music, light, color and interesting action. Retailers need to continue to change their looks, services and merchandise offerings in order to keep up with this trend-oriented IT savy new generation.

What say you?

 

E-learning

E-learning is the multimedia learning system using internet technology and e-portal setup by each university/school/college. This is the latest teaching technology that benefits billions of students and working adult worldwide.

Many education ministry in most of the developed countries and 3rd world countries  are encouraging their higher learning education center, schools, universities and college to adopt this trendy technology to enable the organization to recruits students from anywhere worldwide in order to increase their profit and number of students. This effective multimedia learning using electronic educational technology believed to be able to enhance learning and make education available even deep inside the isolated rural area or jungle.

Malaysia is one of the forefront country of e-learning, you can google and find that almost all of the 600 higher learning institutions in Malaysia has adopted the e-learning system and they have installed their own e-learning portal to enable students/teaching staffs/administration department to upload/download documents and publish events/activities at e-learning portal notice boards.

According to news, a total of 450 massive open online courses (MOOCs) have been offered by public and private universities and college in Malaysia in 2017. According to minister of higher education in Malaysia, Datuk Seri Idris Jusoh, the growth of Malaysia MOOC, the world’s first nationally coordinated online learning initiative has been phenomenal with the number of students who have taken Malaysia MOOC courses has skyrocketed to 600,000 students from more than 170 countries worldwide. To our surprise, 50,000 out of the 600,000 students are actually from Australia and USA. This is a incredible positive sign of the success of e-learning in a 3rd world country like Malaysia. All courses are free available on OpenLearning.com website in Malaysia.

What say you?

 

 

 

 

 

Online shopping addiction & phenomenon

Recently, even in 3rd world country like Malaysia, Indonesia and Thailand, people seems to be more keen in shopping online rather than shopping at malls, shops and supermarket. This trends had been like that since years ago. According to the prediction of Jack Ma in China, most of the super size malls will soon be shutting down and replace by super size warehouse to facilitate online shopping delivery and service, worldwide. is that true?

Nowadays, online shopping had been an addiction to the people especially new generation born after 1990. AS we know, online businesses always seem to know what we want and how to nudge us toward their shopping carts, even when we are just browsing on Facebook or searching for something else. That item you looked at yesterday, suddenly pops up in the corner of your screen like a stealth shopping mousetrap. Thanks to the AI and BI technology, which trace and track down what customers need, what online shoppers are looking at and browsing/searching at social media, internet and google/yahoo/firefox/Opera.

This phenomenon can cause troubles in the working community in a long run, as most of the workers not just busy working, they are busy shopping at the same time and this cause the work force facing challenges and issues that never happen in the past. How should we overcome this problem? Feel free to share your opinions.

 

Social Media & Smartphone addiction and prediction

Recently, all over the world, people is concerning about social media addiction among students, workers and everyone. In Malaysia, student spend a few hours on average per week to browse social media content and internet. Many workers busy doing online shopping instead of carrying out their duties and works in office…

According to Alice G. Walton (Dec, 2017), Searches for “phone addiction” have risen steadily in the past five years, according to Google Trends, and “social media addiction” trails it closely. Interestingly, phone addiction and social media addiction are closely intertwined, especially for younger people, who probably aren’t playing chess on their phones or even talking on them—they’re on social media. And according to a growing number of studies, it’s looking more and more like this pastime is addictive. An earlier study, in the U.S., which also had young people give up their phones, found that they performed worse on mental tasks when they were in “withdrawal,” and felt physiological symptoms, like increased heart rate and blood pressure. They also felt a sense of loss, or lessening, of their extended self—their phones. What actually happen to our community? Are they emphasis more on virtual world, virtual friends,virtual love instead of real interaction and real world?

Lately, Facebook usage was drastically decline by at least 5% compared month to month usage in 2017, according to news. This does not means people is now less addictive to social media, but indeed they prefer more personalized interaction at virtual world using whats apps, wechat and messengers, which seems to be safer and less mess up.

we got to be very careful about this trends and think of a way of how to overcome this addiction before your very smartphone destroy your life, family and everything..

Serious Cyber attack of Phishing in Malaysia

Some of you may already know that in Malaysia, 46 millions personal data belongings to Malaysian data plan users were leaked since 2015(https://www.reuters.com/article/us-malaysia-cyber/malaysia-investigating-reported-leak-of-46-million-mobile-users-data-idUSKBN1D13JM)this is a serious data security issues and the database was alleged to attempt selling at websites. Malaysian police and MCMC are still investigating about this case and trying hard to find a solution. Malaysia is investigating an alleged attempt to sell the data of more than 46 million mobile phone subscribers online, in what appears to be one of the largest leaks of customer data in Asia.

Recently, CyberSecurity Malaysia had signed memorandums of understanding (MOUs) with China super cybersecurity tech company Huawei to build an excellent teamwork in combating cyber security threats and issues in Malaysia. (http://www.zdnet.com/article/huawei-to-underpin-malaysian-tech-roadmap-and-cybersecurity-agenda/) The cybersecurity MOU will involve Huawei’s collaboration with the federal government will create a “safer and more secure cyberspace” for the nation.

This is an excellent sign of positive development as > 90% of Malaysian adults are using smartphone and internet, according to statistic done by researchers. The education rate in Malaysia is higher compared to other neighboring countries, according to UN report, Malaysian education rate till primary is 98%, it means almost everyone in Malaysia is educated and will be able to use smartphone, computer and internet.

Recently, I received a lot of phishing attack via sms, emails and calls from mysterious oversea numbers, which always start with a pre-recorded voice announcement of “you had owed xxx bank RMXXX.XX and press 1 to speak to customer service, 2 to speak to..”if you received this kind of calls, just cut it off, it is a bad and malicious phishing call, which intend to perform crime to steal your personal information for the purpose to steal your online cash at bank accounts or any online accounts. Similar scams are operate using emails, sms and all kind of social media including Facebook, twitter, whatsapp and etc.

 

 

 

 

Users are biggest impediment to Apple iOS security, not technological issues anymore

Apple’s iOS has the trust of enterprise IT, but users can still pose a security threat. (Ramin, 2017)
According to latest research done by Apple researchers, even though Apple iOS is super grade and almost unable to defeat by most of the social engineers and hackers, the issue now is not how strong Apple is, but how weak the Apple users or Apple supporters are in term of cyber security mindset, attitudes and computing experience. So now, our security world is feeling depressed for having a group of Apple users who are so innocent and vulnerable in defending themselves and there is a group of experts cyber hacker and criminals who are aggressively focusing on how to hit them and steal their secret information. This is a battle that will never end in cyber world.
No software is completely secure, but iOS has a strong reputation because Apple regularly updates the operating system and strictly vets apps that developers submit to the App Store. Still, the behavior-based security risks that threaten every operating system — such as when people click suspicious links in emails or don’t set device passcodes — should have IT’s attention. (Ramin, 2017)
“You can make all the security advancements you want in hardware and software, but if a user just gives their password away, that’s all for naught,” said Erik Lightbody, assistant director of technical services at Saint Michael’s College in Colchester, Vt. “Your security precautions go out the window just by someone clicking a link.” (Ramin, 2017)
“Educating people is more effective than any security software you can purchase,” Lightbody said. “If people know what they’re doing, they won’t do things they shouldn’t be doing.” (Ramin, 2017)
The most effective way to address phishing, however, is to make users aware of the threat and how to identify suspicious links. (Ramin, 2017)
So next time, when your CIO, CEO or top management thinking of upgrading their OS/Firewall/Security technological defense system, please remind them to think twice and start investing in upgrading their staff human brain OS instead of purely relying on technological protection, which failed to defense them in new cyber era.
Reference:
Ramin, 2017 – Ramin Edmond – Users are the biggest iOS security threat – TechTarget – http://searchmobilecomputing.techtarget.com/news/450423643/