src='https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2513966551258002'/> Rightways: Computing Infolinks.com, 2618740 , RESELLER

Pages

Share This

Showing posts with label Computing. Show all posts
Showing posts with label Computing. Show all posts

Tuesday, October 2, 2018

Buy and sell stocks online


Rakuten Trade: Fully Online Trading Platforms

 

Rakuten Trade is Malaysia’s first digital equities broker


FOR the first time, trading on Bursa Malaysia can be done completely online. No more having to go through a dealer or making a trip the bank to open an account.

Investors can now open an account within two hours, top up available funds via bank transfer, trade instantly and have access to real time market price feeds – all the functions of a traditional broker except it is completely online.

If you are ready to start investing, it’s pretty simple to get going. Ordinarily, you would need to engage a licensed broker to buy and sell stocks. But not with Rakuten Trade, which has been operating in Malaysia for more than a year as the country’s first fully digital equities broker.

 

Rakuten Trade Sdn Bhd, a joint venture company of Kenanga Investment Bank Bhd and Japan’s Rakuten Securities Inc, was named fintech company of the year at the Malaysia FinTech Awards 2018 in March.

Rakuten Trade has already activated more than 18,000 accounts on its platform of which more than 70% of the account holders are below the age of 40.

“Rakuten Trade has become popular with investors especially first-timers to the equity broking market, which make up 46% of the total client base,” says Rakuten Trade managing director Kaoru Arai.

“Our all-in-one seamless trading platform makes it appealing to this new breed of investors who are more digitally inclined and prefer to execute their trading ideas end-to-end on their own.”

How Rakuten Trade works


The Rakuten Trade business model is premised on six value propositions that are complemented by aggressive marketing efforts that combine local insights with Japan’s best practices.

Its value propositions are as follows:

Online account opening and approval within two hours

> No hardcopy paperwork required.
> No physical visit to the branch.
> Credit/debit card part of the verification process.
> Mobile-friendly account opening page.

Japanese cutting edge mobile trading platform

> Unique platform compared to existing brokers’ mobile trading sites.
> Indices and stock prices are available for free and are not exclusive only to Rakuten Trade customers.
> Additional features available exclusively for Rakuten Trade customers.

Competitive brokerage rates

> The lowest brokerage rates in town.

Financial information

> Research reports derived from the Rakuten Trade research team.
> Hot picks for the week presented in easy to understand formats.
> Short and to the point in the form of a one-page report or 30-second YouTube video.
> Market information available to all (delayed) and live market feeds for Rakuten Trade customers (powered by Thomson Reuter).

Investor awareness and knowledge resource platform

> Knowledge and trading ideas are shared through our seminars, webinars, social influencers.

Rewards ecosystem

> Rakuten Trade customers will be rewarded with RT points that can be converted into points from Malaysia’s top three leading loyalty providers.
> First of its kind in Malaysia to successfully combine AirAsia BIG, B Infinite by Berjaya Group and BonusLink under one umbrella.

Choice of account


Rakuten Trade currently offers investors the choice of two accounts – Cash Upfront and/or Contra Account.

Cash account

> Allows you to trade based on available cash now.
> You will always know your actual cash/portfolio position.
> Available cash balance will earn 2.5% interest per annum.

Contra account

> Allows you to trade more than the money you have in your account.
> Maximises your trading exposure by offering shares as collateral.
> Available cash balance will earn 2.5% interest per annum.
> Settlement of transaction within three days after the transaction (T+3).

If you already purchase airline tickets, electronic gadgets, clothes or even groceries online without any physical intervention, why not trade online?

To learn more about trading online, go to www.rakutentrade.my

Source: TheStaronline

Monday, December 25, 2017

Protect your IoT devices

The Internet of Things is a big, juicy target for criminals. — Dreamstime/TNS

As more and more devices connect to the Internet, the risk of them being targeted by criminals is also increasing.


Internet-connected devices are nearly ubiquitous, with ­computer circuitry now found in a variety of common appliances. They can include security cameras, DVRs, printers, cars, baby monitors, and refrigerators – even “smart” lightbulbs and clothing. Collectively those devices are called the Internet of Things.

The Internet of Things is a big, juicy target for criminals. Up to a million devices were hijacked to create the Mirai botnet which was used to extort companies and bring a university computer system in New Jersey to its knees. The botnet was later exploited to bring down vast swaths of the Internet in a ­sustained attack on Oct 21, 2016.

Paras Jha, a former Rutgers University student, pleaded guilty Dec 8 with two other men who admitted they wrote the Mirai code. Named after an obscure anime film character, Mirai scoured the Internet for unsecured devices and easily found them.

Once discovered, the Internet of Things devices were hijacked by the Mirai malware and became part of a botnet that launched assaults on Internet service providers and scores of websites. Jha, 21, allegedly monetised the botnet by demanding ransom to call off the attacks, using it to inflate the number of advertising clicks on websites, and renting it out to other hackers for their own nefarious ends.

The attacks on Rutgers’ computer system may have cost the school US$9mil (RM36.70mil), prosecutors said. Rutgers officials told NJ.com the cost of enhancing security was one of the reasons the school hiked tuition in 2016.

When Jha discovered federal investigators were closing in, he released the Mirai source code to the world to cover his tracks. The code is still circulating online and causing damage, according to Brian Krebs, of KrebsOnSecurity.com.

Krebs advises taking these precautions to keep your Internet of Things devices protected:

– Avoid connecting your devices directly to the Internet.

– Change the default credentials to a complex password that only you will know and can remember. – Check the defaults, and make sure things like UPnP (Universal Plug and Play – which can easily poke holes in your fire wall without you knowing it) are disabled.

– Avoid Internet of Things devices that advertise built-in Peer-to-Peer (P2P) capabilities. P2P Internet of things devices are notoriously difficult to secure, and research repeatedly has shown that they can be reachable even through a fire wall remotely over the internet. That’s because they’re configured to continuously find ways to connect to a global, shared network so that people can access them remotely.

– When it comes to Internet of things devices, cheaper is definitely not better. There is no direct correlation between price and security, but history has shown that less expensive devices tend to have the most vulnerabilities.

The US Department of Justice also offers these tips to protect Internet-connected devices.

– Do your research. Consider the security features of your Internet of things devices before buying. If the device uses a password, make sure it allows you to change it.

– Update firmware when available. Internet of Things devices can be susceptible if not regularly patched. Only install updates from known and reputable sites.

– Disconnect your insecure Internet of Things devices. Outdated security? Can’t update passwords? Then unplug it. – Turn off Internet of Things devices when not in use, or periodically if otherwise always on. Malware is stored in memory and can often be erased by turning the device off and back on.

– Protect routers and WiFi networks. Use your router’s built-in fire wall, confirm it’s enabled.

– Avoid using public WiFi to check Internet of things devices from a smartphone.

– Use antivirus and intrusion-detection products.

– Ask for help, or hire help, if you can’t figure out fire walls or how to “segment” your network of Internet of things devices.

Some free online resources can help determine whether your devices are susceptible to being accessed by Mirai or other malware. Be cautious and use only well-known sources.

If you suspect your Internet of things device is infected, turn it off and on again to purge the device’s memory. Change the password. — The Philadelphia Inquirer/Tribune News Services

Source: By Sam Wood Tech News

Related Links:

New digital ‘hurricane’ churns, gathering strength to land blow on the Internet

Just as hurricane trackers chart storms in the Atlantic before they make landfall, cybersecurity researchers track viral infections that threaten mayhem. They've found a doozy.
A massive zombie robotic network, or botnet, has expanded to infect "an estimated million organizations" and could bring corners of the internet to its knees, Check Point Software says. — Sipa USA/TNS

Tuesday, September 19, 2017

JPMorgan CEO warns he will fire any employee trading Bitcoin for being “stupid.”

 

 
Tough stand: Dimon has warned that he will fire JPMorgan traders who traded in bitcoin ‘in a second. For two reasons: It’s against our rules, and they’re stupid. And both are dangerous.’ — AFP

NEW YORK: JPMorgan Chase & Co chief executive officer Jamie Dimon said he will fire any employee trading bitcoin for being “stupid.”

The cryptocurrency “won’t end well,” he told an investor conference in New York on Tuesday, predicting it will eventually blow up. “It’s a fraud” and “worse than tulip bulbs.”

If a JPMorgan trader began trading in bitcoin, he said: “I’d fire them in a second. For two reasons: It’s against our rules, and they’re stupid. And both are dangerous.”

Bitcoin has soared in recent months, spurred by greater acceptance of the blockchain technology that underpins the exchange method and optimism that faster transaction times will encourage broader use of the cryptocurrency.

Prices have climbed more than four-fold this year – a run that has drawn debate over whether that’s a bubble.

Bitcoin initially slipped after Dimon’s remarks. It was down as much as 2.7% before recovering.

Last week, it slumped after reports that China plans to ban trading of virtual currencies on domestic exchanges, dealing another blow to the US$150bil cryptocurrency market.

Tulips are a reference to the mania that swept Holland in the 17th century, with speculators driving up prices of virtually worthless tulip bulbs to exorbitant levels.

That didn’t end well.

In bitcoin’s case, Dimon said he’s sceptical authorities will allow a currency to exist without state oversight, especially if something goes wrong.

“Someone’s going to get killed and then the government’s going to come down,” he said.

“You just saw in China, governments like to control their money supply.”

Dimon differentiated between the bitcoin currency and the underlying blockchain technology, which he said can be useful.

Still, he said banks’ application of blockchain “won’t be overnight.”

The bank chief said he wouldn’t short bitcoin because there’s no telling how high it will go before it collapses.

The best argument he’s heard, he said, is that it can be useful to people in places with no other options – so long as the supply of coins doesn’t surge.

“If you were in Venezuela or Ecuador or North Korea or a bunch of parts like that, or if you were a drug dealer, a murderer, stuff like that, you are better off doing it in bitcoin than US dollars,” he said.

“So there may be a market for that, but it’d be a limited market.”— Bloomberg


Related Links:





 
Related posts:

Friday, July 14, 2017

Dengue app bad for aedes, can get updates, report dengue concerns

The ‘Predict and Beat Dengue’ app is now available on Google Play Store and Apple App Store.

Predict and Beat Dengue - Android Apps on Google Play

https://youtu.be/jYL-EBSrV_8

App for updates on dengue


PENANGITES can now download a mobile application (app) which allows its users to be part of an effort to combat dengue in the state.

Known as the ‘Predict and Beat Dengue’ app, it will alert users when they enter a dengue hotspot.

The users can also report dengue-related concerns in their areas and get the latest updates on dengue cases as among its other features.

State Health Committee chairman Dr Afif Bahardin said the app is now available on Google Play Store and Apple App Store.

He said the app could help to predict a possible dengue outbreak in an area within the next 30 days.

“From there, we can carry out prevention by removing all possible Aedes breeding grounds.

“It quickens the process of detection and identifies places that require dengue preventative measures such as fogging, larvae-ciding and gotong-royong,” he said during a briefing session at Komtar yesterday.

Dr Afif said the state spent RM200,000 on a pilot study for the project which was carried out between May 1 and July 1 by the app creator, a US-based company known as Aime Inc.

“I’m proud that Penang is taking this proactive approach. We are working hand-in-hand with the Health Ministry and they are very supportive of this idea.

“We hope that it can also be carried out nationwide,” he said.

Aime president Rainier Mallol explained the workings of the app and its many features during the presentation.

Also present were Pulau Tikus assemblyman Yap Soo Huey, Batu Uban assemblyman Dr T. Jayabalan and Sungai Pinang assemblyman Lim Siew Khim.

Source: The Star/ANN

Related Links:

Groups lend their support in protest against hillslope project
 
Large crowds swarm two-day travel fair

Big drop in dengue cases

Toasting a year’s success

Road to dam reopened after nine-month closure

Related posts:

Brought down: A view of the fallen backyard wall and awning of the house. Penang MCA: Guan Eng must explain cause of incident in house ...

Technology update:


CalTech Data Analysts Server for the Large Hadron Collider at CERN Deploys Kingston Technology DCP1000 SSDs



https://youtu.be/Voo9dA2AiOw

Monday, July 10, 2017

Six simple steps to defend your data from ransomware


Recent ransomware attacks have rattled internet users around the world. This malicious software blackmails users by encrypting the files on their computer or mobile device and demanding payment, generally in the virtual currency bitcoin, to unlock them. But these six simple security measures can significantly reduce the risk of a computer being hit by an attack.

1. Regular updates: Software updates for browsers and operating systems don't just add new functions – they also install security patches to protect computers against the latest malicious software.

The German Federal Office for Information Security (BSI) recommends enabling automatic updates on a device and advises against the use of older operating systems such as Windows XP, for which Microsoft has stopped providing regular security updates.

Microsoft will also discontinue updates for the operating system's successor, Windows Vista, this summer – all the more reason to replace it with a newer version.

2. Be vigilant: Don't trust anyone, says nomoreransom.org, a website run by IT security companies and European law enforcement. Never open email attachments from suspicious accounts, don't click on questionable links and don't download unverified software.

Even emails from friends and co-workers should not necessarily be trusted. Before opening an attachment or clicking on a link, always take time to consider whether the sender's online account could have been hacked or their computer software infiltrated by malicious software.

3. Antivirus software: Enable all the security applications in your operating system, advises the BSI. Reliable antivirus software can provide further protection, but must be kept up-to-date.

4. Back up data: Creating digital duplicates of your files can protect your personal information from disappearing forever. In the event of an attack, you can just transfer over your back-up files.

Windows (Backup and Restore) and MacOS (Time Machine) have in-built applications for backing up your data, but they might not be accessible in the event of an attack. A more secure option would be to save your files in an external device, such as a hard disk drive, solid-state drive, DVD, or in the cloud.

To reduce the risk of spreading viruses, only connect the external drive to a device during file transfers. As an extra precaution, save your data in two separate external hard drives.

5. Fight back: If you happen to accidentally install malicious software or receive suspicious messages, immediately disconnect your device from the internet, instructs  nomoreransom.org. to be decrypted. This will prevent the infection from spreading.

You can then run a clean installation of your computer software, and transfer over your back-up files. For some types of ransomware, there are techniques to unlock the content on your computer.

The latest malware outbreak "Petya" can be stopped by creating the read-only filetype "C:\Windows\perfc.dat," which prevents it from scrambling your files. An initial report on the antidote published on the site bleepingcomputer.com has since been confirm by several IT security companies.

6. Never pay: A blackmailer's demands should never be met, says the State Office of Criminal Investigation (LKA) of Lower Saxony. There are several reasons for this, the LKA reports. First, even if you pay the ransom, there is no guarantee that you will regain access to your files.

Second, by paying the attacker, you are supporting the growth of a criminal industry. Every payment finances new attacks. In the case of the recent Petya outbreak, the payment system is useless, because only one email address was provided, which has since been shut down by the provider. — dpa

Related Links

Six simple steps to protect your data from ransomware

Six simple methods to save your information from ransomware http://www.techagentmedia.com/six-simple-methods-save-information-ransomware/ via @techagentmedia


Related posts:

WannaCry ransomeware attacks, how to prevent it? 


Malware, ransomware attacks are a growing threat to computer and mobile phone!  

Malware, ransomware attacks are a growing threat to computer and mobile phone!

Wednesday, July 5, 2017

Hello, Penang police calling ... Macau Scammers reap RM2.7mil




Scammers busted: Penang CCID chief ACP Abdul Ghani Ahmad, flanked by DSP K. Balachandran and DSP Shamsul Farid Abdul Rani, showing seized passports, a photocopy of a MyKad and a letter during a press conference on the Macau Scam syndicate in George Town.

But the ‘officer’ on the other end of the line may well have been a member of a Macau Scam syndicate, which cloned the phone number of the state police headquarters to use in its con game. The operation, believed to have netted RM2.74mil so far, was smash

Syndicate cloned police phone number to trick 82 victims this year.


GEORGE TOWN: A Macau Scam syndicate has duped victims of more than RM2.74mil, using Voice over Internet Protocol (VoIP) technology to replicate the telephone number of the Penang police headquarters to con victims.

No fewer than 82 people had fallen prey to the scam since February.

The syndicate used a three-storey bungalow as its training centre before the members were deployed to Japan, Cambodia, Thailand and other Asian countries.

On Saturday, the syndicate was crippled by police following the arrest of 50 people, including three women.

Penang Commercial Crime Investigation Department (CCID) chief Asst Comm Abdul Ghani Ahmad said the suspects, aged between 17 and 42, were arrested at the bungalow in Taman Damai Utama in Puchong, Selangor, at about 8am.

“Intelligence gathering was carried out for about a month after we received a police report from a woman in Balik Pulau, who transferred RM5,000 to an account given by the scammers,” he told a press conference at the state police headquarters in Penang Road yesterday.

“She was told that her bank account would be frozen by Bank Negara Malaysia.

“The scammers promised to return the money to her a week later after the ‘investigations’ were over, but she did not get her money back.”

ACP Abdul Ghani said police investigations revealed that one of the suspects would pose as a bank officer and tell the victim that he or she had a loan with a particular bank.

If the victim denied it, the scammer would give them the contact number of a “Bank Negara officer” – another scammer – to check out the claim.

Those who are still not convinced would then receive a call from 04222 1522, which appeared to be the general line of the state police headquarters but had been replicated or cloned using VoIP technology to appear as such.

ACP Abdul Ghani added that another scammer, posing as a CCID officer, would then tell the victim that his or her bank account had been misused for criminal activities and was frozen pending investigation.

“The scammer will then ask the victim to transfer money to a specific account, and that would be the last they see of their money,” he said.

ACP Abdul Ghani added that 82 reports were lodged nationwide on this scam so far this year.

He said police also seized five mobile phones, a laptop, photocopied MyKad, photocopied passports, a set of scripts on what to say when posing as a police officer and bank officer, and 31 Malaysian passports.

In Police Custody: Some of the passports and Mykads seized from the Macau Scam syndicate being displayed at the state police headquarters in Georgetown.

“We are also checking if the mastermind was among the suspects arrested,” he said.

ACP Abdul Ghani added that the suspects were remanded for three days until today and would be brought to the Balik Pulau court for remand extension pending investigations under Section 420 of the Penal Code for cheating.

Nobody knows exactly how the term “Macau Scam” came to be used.

However, former Interpol president Tan Sri Khoo Boon Hui has been quoted as saying that the scam apparently originated from Macau and was operated from other countries such as Cambodia, Indonesia, the Philippines and Thailand.

Another version circulating was that the first victims were in Macau, but the Macau police have declined to comment.

Source: The Star by crystal chiam shiyingandmuhammad nazrul haffiz salim

Remand of Macau Scam suspects extended



BALIK PULAU: Fifty suspects of the Macau Scam syndicate have their remand order extended by another three days by a magistrate’s court here.

Sirens from four police cars blared as two trucks arrived at the courthouse at about 8.40am yesterday.

Dressed in purple lockup T-shirts, the suspects, aged between 17 and 42 who include three women, hid their faces when they saw the press corp.

They are believed to be part of a Macau Scam syndicate which used Voice over Internet Protocol (VoIP) technology to swindle 82 victims of more than RM2.74mil since February.

It was reported that the syndicate used VoIP to replicate the hotline number of the Penang police headquarters to trick victims.

They were arrested at a bungalow in Taman Damai Utama in Puchong, Selangor, at about 8am on Saturday after a woman from Balik Pulau lodged a report, claiming she had been duped into transferring RM5,000 to an account.

Police are investigating the case under Section 420 of the Penal Code for cheating. - The Star

Related links:


MACC looking for Sabri Ahmad Tah

Sunday, May 14, 2017

WannaCry ransomeware attacks, how to prevent it?

Source: Intel.malwaretech.com

'Do not pay ransomware hackers' - Nation


WannaCry has spread to Malaysia; two companies here were stricken by the ransomware virus that has infected a massive number of computers across the globe since Friday. Hackers use the virus to hold a victim’s data to ransom – pay up or lose all your information – and the victims overseas include hospital networks, businesses and government agencies.

PETALING JAYA: All governmental agencies have been told of the WannaCry ransomware outbreak and have armoured themselves against attacks.

“All government agencies at federal and state level have been alerted and ensured that their computers have been patched accordingly,” said CyberSecurity CEO Datuk Dr Amirudin Abdul Wahab.

Dr Amirudin said the WannaCry ransomware exploited vulnerabilities of the Windows operating system, especially on Windows XP which has stopped receiving updates since 2014.

“The malware exploits a flaw in the network protocol called the Server Message Block. Unlike former malware cases which is localised to a single computer, WannaCry exploits the operating system’s vulnerabilities and spreads it across PCs in the network.

“This is why it spread at such speed and range. Realising this, Microsoft came out with the MS17010 patch to stop this particular malware from working and spreading,” he said in a phone interview.

The patch was first rolled out in March this year but was not available to Windows XP, Windows 9 and Windows 2003 until May 12, after WannaCry’s outbreak.

According to the Microsoft Security Response Centre, Windows 10 users were not targeted by the attack.

To protect themselves against any malware attack, computer users were urged to back up their files, avoid clicking on suspicious links online or download attachments in e-mail messages sent by strangers.

“Apart from preventive measures, if you think you have been infected by the malware, please report to us at cyber999@cybersecurity.my or call us at 1300-882999,” he said.

In response to a question, Dr Amirudin said it was not an obligation under the law for anyone to report any security breach.

“It is not mandatory in Malaysia, unlike in some other countries,” he lamented, pointing out that when people made a report to CyberSecurity, their confidentiality would be paramount.

“We can also provide assistance,” Dr Amirudin added.

As of 6pm yesterday, CyberSecurity has yet to receive any report on infected computers in Malaysia.

“It does not mean that infection will not happen. At present, however, the situation is manageable and under control and we are always on the alert,” he said.

When contacted, the Malaysian Communications and Multimedia Commission and CyberSecurity Malaysia also said they had not received any report of a WannaCry infection in Malaysia.

Ransomware: how hackers take your data hostage


Screens of NHS computers with images demanding payment of US$300 (RM1,302) in Bitcoin (Bitcoin, digital currencies rally, caution prevails; virtual currency in property), saying: “Ooops, your files have been encrypted!”

It demands payment in three days or the price is doubled, and if none is received in seven days the files will be deleted, according to the screen message.

“Ransomware becomes particularly nasty when it infects institutions like hospitals, where it can put people’s lives in danger,” said Kroustek, the Avast analyst.

A hacking group called Shadow Brokers released the malware in April claiming to have discovered the flaw from the NSA, Kaspersky said.

Although Microsoft released a security patch for the flaw earlier this year, many systems have yet to be updated, researchers said.

“Unlike most other attacks, this malware is spreading primarily by direct infection from machine to machine on local networks, rather than purely by email,” said Lance Cottrell, chief scientist at the US technology group Ntrepid.

Some said the attacks highlighted the need for agencies like the NSA to disclose security flaws so they can be patched.

G7 finance ministers meeting in Italy discussed the attacks and were expected to commit to stepping up international cooperation against a growing threat to their economies. — AFP

Massive Ransomware Attack Hits 99 Countries

PHILADELPHIA (CNN)–Tens of thousands of ransomware attacks are targeting organizations around the world on Friday.

Cybersecurity firm Avast said it has tracked more than 75,000 attacks in 99 countries. It said the majority of the attacks targeted Russia, Ukraine and Taiwan.

What is it?

The ransomware locks down all the files on an infected computer and asks the computer’s administrator to pay in order to regain control of them.

The ransomware, called “WannaCry,” is spread by taking advantage of a Windows vulnerability that Microsoft released a security patch for in March. But computers and networks that haven’t updated their systems are at risk. The exploit was leaked last month as part of a trove of NSA spy tools.

“Affected machines have six hours to pay up and every few hours the ransom goes up,” said Kurt Baumgartner, the principal security researcher at security firm Kaspersky Lab. “Most folks that have paid up appear to have paid the initial $300 in the first few hours.”

Sixteen National Health Service (NHS) organizations in the UK have been hit, and some of those hospitals have canceled outpatient appointments and told people to avoid emergency departments if possible. Spanish telecom company Telefónica was also hit with the ransomware.

Spanish authorities confirmed the ransomware is spreading through the vulnerability, called “EternalBlue,” and advised people to patch.

“It is going to spread far and wide within the internal systems of organizations — this is turning into the biggest cybersecurity incident I’ve ever seen,” UK-based security architect Kevin Beaumont said.

Russia’s Interior Ministry released a statement acknowledging a ransomware attack on its computers, adding that less than 1% of computers were affected, and that the virus is now “localized.” The statement said antivirus systems are working to destroy it.

Megafon, a Russian telecommunications company, was also hit by the attack. Spokesman Petr Lidov told CNN that it affected call centers but not the company’s networks. He said the situation is now under control.

“We encourage all Americans to update your operating systems and implement vigorous cybersecurity practices at home, work, and school,” the U.S. Department of Homeland Security said in a statement released late Friday. “We are actively sharing information related to this event and stand ready to lend technical support and assistance as needed to our partners, both in the United States and internationally.”

Kaspersky Lab says although the WannaCry ransomware can infect computers even without the vulnerability, EternalBlue is “the most significant factor” in the global outbreak.

How to prevent it

Beaumont examined a sample of the ransomware used to target NHS and confirmed it was the same used to target Telefónica. He said companies can apply the patch released in March to all systems to prevent WannaCry infections. Although it won’t do any good for machines that have already been hit.

He said it’s likely the ransomware will spread to U.S. firms too. The ransomware is automatically scanning for computers it can infect whenever it loads itself onto a new machine. It can infect other computers on the same wireless network.

“It has a ‘hunter’ module, which seeks out PCs on internal networks,” Beaumont said. “So, for example, if your laptop is infected and you went to a coffee shop, it would spread to PCs at the coffee shop. From there, to other companies.”

According to Matthew Hickey, founder of the security firm Hacker House, Friday’s attack is not surprising, and it shows many organizations do not apply updates in a timely fashion. When CNNTech first reported the Microsoft vulnerabilities leaked in April, Hickey said they were the “most damaging” he’d seen in several years, and warned that businesses would be most at risk.

Consumers who have up-to-date software are protected from this ransomware. Here’s how to turn automatic updates on.

It’s not the first time hackers have used the leaked NSA tools to infect computers. Soon after the leak, hackers infected thousands of vulnerable machines with a backdoor called DOUBLEPULSAR.

Source: CNN’s Clare Sebastian contributed to this report.

WannaCry strikes two Malaysian companies



http://clips.thestar.com.my.s3.amazonaws.com/Interactive/ransomware2017/ransomware2017.mp4

PETALING JAYA: Two local companies have been hit by the infamous WannaCry ransomware, three days after the malicious software was released, infecting 200,000 computers in 150 countries so far.

According to IT security services company LGMS, the first case in Malaysia involved a director of one of its clients who came across the dreaded ransomware on his personal laptop on Saturday morning.

LGMS founder C.F. Fong said the data in the laptop had to be erased as the person did not intend to pay the US$300 (RM1,300) ransom.

The same ransomware appeared in the machine of an automotive shop on Sunday morning.

“The company didn’t have any backup and might pay (the ransom),” said Fong.

Besides disconnecting compu­ters from the network, there was not much else they could do, he noted.

As of 3pm yesterday, a website tracking incidences of WannaCry infections started showing blips in the Klang Valley area.

The website displays a blip whenever an infected computer pings its tracking servers, thus allowing it to map out a geographical distribution of the WannaCry infection.

Fong added that any machine infected by WannaCry should not be connected to a public or cor­­porate network.

“Once you plug into any network, it will start spreading,” he pointed out.

Fong said none of LGMS’ clients, which include major banks in Malaysia, had reported any pro­blems so far, adding that he was quite confident that those who re­gularly updated their computers would not face any problems with WannaCry.

He said ransomware was not new but WannaCry had caused worldwide alarm because of how fast it was spreading.

“We have seen worse and devastating ransomware attacks before but WannaCry’s infection rate is one of the fastest ever as it exploits the vulnerability that exists in Windows,” Fong said.

Security companies all over the world are reporting an unprecedented wave of WannaCry ransomware infections since Friday when more than 150 countries were hit by it.

The ransomware encrypts the data on an infected computer, preventing users from accessing it.

According to a report in The Guardian, the ransomware uses a vulnerability first revealed as part of a leaked stash of NSA-related documents, which infects machines running Windows and encrypts their contents before demanding a ransom to decrypt these files.

The perpetrators promise to release the data once a ransom of US$300 (RM1,300) is paid.

In just two days, computer networks of Britain’s National Health Service, Russia’s interior ministry and international shipper FedEx, among others, were affected.

The website tracking incidences of WannaCry infections was created by a 22-year-old British re­sear­cher known only as MalwareTech, who was credited with being an “accidental hero” after discovering a “kill switch” that halted WannaCry’s outbreak.


Cyber security expert: WannaCry ransomware has ... - The Star Online

Malaysia also hit by WannaCry ransomware - Nation

Singapore not affected by cyber attacks

How to Remove Ransomware. - Ransomware Removal Instruction

Police raid CYL office, seize items

Tuesday, November 8, 2016

China tops global fintech rankings

China's financial technology (fintech) firms continue to lead globally, securing four positions in the top five in a recent industrial ranking.[Photo: mindai.com]

China's financial technology (fintech) firms continue to lead globally, securing four positions in the top five in a recent industrial ranking.

Alibaba's third-party payment platform Ant Financial tops the global ranking for the 100 best performing fintech companies, with micro-loan firm Qudian, wealth management company Lufax and insurance enterprise Zhong An entering the top five, according to a report by international accounting firm KPMG and investment firm H2 Ventures.

The firms are rated according to their capital raising volume and ratio, geographic and sector diversity, and consumer and marketplace traction.

"It is no surprise to see four Chinese companies in the top five. Fintech in China has seen rapid development, fuelled by the demand to address domestic needs," said James McKeogh, Partner with KPMG China. "It is likely that we will see more of these players move to the international markets in the future."

A total of eight Chinese fintech companies are on the list, a remarkable rise from just one company in the top 100 in the 2014 ranking.

"We have seen significant investment in China's fintech sector in recent years, and an increasing appetite for innovative products, supported by the rapid pace of technology development," according to Raymond Cheong, another KPMG China Partner.

China pledged in October to improve supervision in online finance, including peer-to-peer platforms, to contain risks, improve competitiveness and increase risk awareness.

Companies related to lending and insurance are gaining larger share in the full Fintech 100 list, while the creation of value in new sub-sectors such as regulatory technology as well as data and analytics make the fintech sector more diverse, according to the report.

Source:




Related Posts:

Jack Ma advisor to Malaysian Govt on digital economy to start with e-FTZ
https://youtu.be/fb74uSG-7Ro China-Malaysia Promising relationship: Najib delivering his speech in Beijing. ‘A digital economy with e... 

 
May 21, 2016 ... A BUZZWORD growing in popularity in the financial world today is “fintech”, short for financial technology, which in a nutshell refers to the use .


 
Apr 16, 2016 ... The reason why traditional bank shares are dropping like a stone is that mobile phone companies and financial technology (FinTech) platforms ...

Saturday, October 8, 2016

Internet addiction on the rise among Malaysian youths, Asians one of the most addicted to the Internet


Enough evidence to show links to anxiety, decreased job productivity, says expert.


CYBERJAYA: A 14-year-old boy loved gaming so much that he did not leave his home for half a year until his parents hauled him to therapy for Internet addiction.

This sounds like a story that happens in Japan, China or South Korea, where teenagers have died from binging on their computers. But this case happened right here in Kuala Lumpur.

At the International Society of Internet Addiction (Isia) Conference here, researchers said they were most worried that Malaysian youth were increasingly using the Internet in excess, with local studies revealing that 37% of Malaysian parents felt their children’s online life was interfering with their home and school obligations while 18% said their children were sacrificing basic social activities.

The research, led by child psychologist and Isia spokesperson Dr Norharlina Bahar, found that males under the age of 24, from the Klang Valley, Ipoh or Penang, were the most susceptible to Internet addiction in Malaysia.

“Most spend time on online games and browsing social media and there is enough evidence to show links to anxiety, depression, physical health problems, school disconnection, unemployment, decreased job productivity and social isolation,” she said.

Studies have also found frequent use of the Internet could translate to low self-esteem, depression, boredom and attention-deficit hyperactive disorder.

“There is no denying that Internet eases our life but when it affects your mental health capacity and interferes with your day-to-day work, then you need help,” she added.

In the case of the young boy, Dr Norharlina said he became irritable and angry when he was cut off from the digital world by his parents as part of the treatment.

“This is becoming a bigger problem now,” she said.

The challenge for the academic community is translating their data into tangible policies, as definitions of Internet addiction are still being worked out, she added.

That is something the Malaysian Communication and Multimedia Commission (MCMC) is seeking to address, by adapting research on Internet addiction into guidelines that can be used by school counsellors or pa­rents to identify addiction in adolescents, said MCMC advocacy and outreach senior director Eneng Faridah Iskandar.

“We want to know when is usage going to be a problem. When should I start regulating my child’s use of the Internet? We want to develop self-help tips that parents can use,” she said.

The conference was attended by 200 researchers and psychologists from 10 countries to present their findings on Internet wellness and discuss policies to address the effects of the digital world on users’ health.

Asians one of the most addicted to the Internet


CYBERJAYA: The Middle East, North America and Asia have the highest number of people addicted to the Internet, said Hong Kong University (HKU) Psychology. Department Associate Dean Prof. Dr Cecelia Cheng.

Dr. Cheng, who presented the findings of a HKU study on Thursday said that findings suggest that the more a country experiences traffic jams, air pollution and low life satisfaction, the more likely its citizens will be addicted to the Internet.

She added that out of 31 countries surveyed, European and South American nations had the smallest number of people addicted to the Internet. “Basically if the life satisfaction of a country is low, the people in that country are more likely to be addicted to the Internet, particularly gaming,” she said.

Speaking at the International Society of Internet Addiction (ISIA) conference here, Dr Cheng added that there was a link between countries that have high levels of air pollution and Internet addiction.

“The study suggests that the problem of Internet addiction could be linked with the external environment that drives people indoors. Low life satisfaction also suggests that people look to the Internet for escapism when they are dissatisfied with the outside world,” she said.

Dr Cheng pointed out that less people are addicted to the Internet in Europe because pollution and crime rates are generally lower.

“In Europe, and people there can afford to engage in more outdoor activities than those in the Middle East and Asia,” she said.

She added that improving the quality of environmental conditions might encourage residents to engage more in outdoor activities rather than relying solely on browsing the Internet at home for stress relief.

Malaysia was not surveyed in the HKU study, but local authorities suggested that Internet addiction was a rising trend here too. According to the Malaysian Communication and Multimedia Commission (MCMC), 50.4% of children already have a smartphone by the age of 12 and Malaysians have a 100.4% penetration rate for Internet connectivity and a 143% penetration rate for cellular use.

An ISIA study led by Dr Norharlina Bahar also found that the prevalence of problematic Internet users in Malaysia could be as high as 49.2%, with people spending at least five-hours in front of screens daily.

In last year’s World Happiness Index which measures a country’s general wellbeing, Malaysia ranked 61 out of 161 countries, behind Singapore, Indonesia, Thailand and the Philippines.

By Nicholas Cheng The Star/ANN

Related posts:




  Internet addiction taking toll on health !

 Sick gamers on the rise ! 

 Internet addiction taking toll on health !

Sunday, August 14, 2016

The tyranny of Pokemon Go, more addictive than other games

No prizes for guessing what these folks at a public park in the centre of Hanoi are doing. Yes, the Pokemon Go craze has spread far and wide. Photo: AFP

It's repetitive. The 'game play' is puerile. But it does cast a spell on players.


Malaysia, a plague has just arrived in your land and, if the rest of the world is any indication, it will infect every corner of your society. I’m talking of course about the infectious tyranny that is Pokemon Go. Really.

This is a game with very little in actual game play. You throw Pokeballs at Pokemon that spawn seemingly all over your neighbourhood, on your friends, and even in your own home. You capture them to fight other Pokemon, then you wash, rinse, repeat.

The battle aspect comes down to swiping right and tapping your screen a bunch of times. It’s not exactly the most nuanced or skilled or even fun game play in the world but yet, Pokemon Go has taken over the world.

I didn’t quite understand it until it arrived in Hong Kong, but suddenly on the street people were face down in their phones even more so than usual. And whenever I snuck a look there was a little critter bouncing around on their screens that they were trying to capture by tossing Pokeballs at it.

Silly. Ridiculous. So of course, yours truly had to try it.

And of course, yours truly got addicted just like everyone else.

Really, the game should be called Pokecrack or something a little more indicative of its addictive nature. Walking the dog at night, I seek out the local gyms – Pokemon Go locations where you can train or battle other Pokemon, but only at certain locations in the city – see, that’s why it’s got the “Go” in its name, this isn’t a game you can play from home – and at all these locations, even at midnight, I find people milling around in their pyjamas outside, with their faces stuck to their phones. Me included.

I went to a bar to meet a friend the other day and of course we started hunting Pokemon while there, which quite a few others were already doing. On the way out to the pay the bill the barkeep invited us back on Saturday because they would be “buying lures all day to attract more Pokemon”. Yes, Pokemon is now a way to attract people to your business.

Pikachu, I choose you.

But why is this game so addictive? I just said the game play was infantile. So simple that it boggles the mind. And it is. But everything in Pokemon Go centres on the rewards of new and exotic Pokemon and levelling up.

Basically it’s a game that hinges on the Random Reward Schedule.

The Random Reward Schedule is a tenet of behavioural psychology. It’s a form of reinforcement. Reinforcement, of course, “strengthens an organism’s future behaviour whenever that behaviour is preceded by a specific antecedent stimulus”. That’s a mouthful.

Basically, what it’s saying is that you will continue to do a thing if you get positive feedback.

This all goes back to the research of B.F. Skinner, who noted that the variable reward schedule or the random reward schedule resulted in the most compulsive and addictive behaviour in mice. Basically, mice were trained to press a lever that would dispense treats.

The mice that were rewarded with a treat every time were less inclined to keep pressing the lever, than the mice that were rewarded with a large treat at random intervals. The idea being that when a mouse thinks there could be a nice reward just around the corner, it will keep performing the same action.

The same goes for humans.

In Pokemon Go you’re constantly checking for Pokemon appearing in your vicinity. Most times they are common ones like Pidgeys or Caterpies, but every once in a while, you find something exciting like a Vaporean or an Electabuzz. And yes, I know how nerdy this sounds right now. Those rare and exotic Pokemon are just like large treats to a mouse.

The random reward schedule is linked to the Hook Model which is a technique employed by social media and mobile game designers and, of course the designers of Pokemon Go. Its mission – the name gives it away – is to hook you.

It goes beyond simple reinforcement of behaviour; it’s all about creating habits so that we’ll continue doing something the designers want us to do. In this case, it’s to continue searching for Pokemon and hopefully spend a few of our hard-earned dollars for gear that will help us do just that.

Pokemon Go also employs another aspect of the model, and that is our need to hunt. In the evolutionary sense, we are hunters, hunting for food in the wild. Pokemon Go employs a tracking system to find those rare and exotic Pokemon so that we are literally hunting down little virtual critters. All. Day. Long.

But we’re not hunting for sustenance, now we’re just hunting for the sake of hunting. Our genetic urges are misfiring all over Pokemon Go.

And knowing that I’m being manipulated on the most fundamental level by this game, I’m still checking my phone periodically to see if any rare Pokemon have showed up. And it’s not even fun.

So what to do, now that Pokemon Go has come for … to us? It really depends. It does make you walk more, and it can make your daily commutes a little more enjoyable (depending on your definition of enjoyable) – but if you don’t like having your face stuck in your phone, then you’re better off treating Pokemon Go like drugs, and not even trying it.

 By Jason Godfrey -

Catch Jason Godfrey on The LINK on Life Inspired HD (Astro Ch 728).

More addictive than other games


CATCHING virtual critters on Pokémon GO has a tendency to be more addictive than other online games.

Experts say the risk of being addicted to the highly-popular game is increased because it is a feast for the senses.

This is especially since it is an augmented reality game, which requires players to have a live direct or indirect view of their physical surroundings.

“The risk of addiction is increased as there are multiple sensory bombardments that sustain playing Pokémon GO.

“Such sensory bombardments are continuous, leading to pleasure and satisfaction highs once players level up in the game and are motivated to continue,” explains Universiti Sains Malaysia criminologist and psychologist Dr Geshina Ayu Mat Saat.

She says this can be dangerous as it makes individuals dependent on the game for pleasure or happiness and some people may confuse the two.

“It could also lead to despair when the game is concluded, when they experience problems, or when a level objective could not be met.

“These are similar responses that an addict experiences. Normal functioning is disrupted, the least being in terms of sleeping and eating patterns,” Dr Geshina says.

Other aspects that could be affected are family interaction, work-life balance, carrying out responsibilities and daily tasks.

Dr Geshina finds that there are pros and cons to playing the game.

“On one hand, players will get more physical exercise, apply problem-solving skills, and have some social interaction when they meet other players in real life,” she says.

But on the other hand, too much focus on their phones may narrow their perception, leading to selective attention on the immediate environment to fulfil the needs of the game rather than a genuine appreciation of the outdoors.

“Social interaction may be limited to brusque questions of where the characters are, rather than polite or pleasant queries to initiate meaningful conversation,” says Dr Geshina.

She also notes that there is also a possibility that players, especially children, will be unable to separate between reality and the game as it blurs the lines and makes players a living game avatar.

Malaysian Mental Health Association deputy president and consultant psychiatrist Datuk Dr Andrew Mohanraj Chandrasekaran says people are generally eager to embrace new technology and will surely warm up to augmented reality games like Pokémon GO.

Describing the game as “taking it one step further”, he says one positive point of the game is that it can motivate people to get out more and connect with others with common interests.

“This is particularly relevant to people with introverted personalities and those suffering from depression.”

Dr Andrew, however, points out that the game can be a double-edged sword and could also work negatively in making people more engrossed in their phones.

“Ultimately, technology must be embraced for the right purpose – be it for recreational, therapeutic or competitive purposes.

“Technology can also be harmful, destroy interpersonal relationship, affect social cohesion, blur the lines between appropriate and inappropriate behaviour and cause confusion between reality and the virtual world.

“Knowing how to embrace technology in a balanced manner is the answer,” he says.

Sources:  The Star/Asia News Network