Archive for the ‘Security’ Category

Fujitsu LIFEBOOK E Series for business computing (fr S$2,599)

Wednesday, May 8th, 2013

Fujitsu today unveiled its slimmest business notebooks: LIFEBOOK E753, 743, and E733. Available from June 2013.

From Left - Fujitsu LIFEBOOK E753, LIFEBOOK E743 and LIFEBOOK E733.

From Left – Fujitsu LIFEBOOK E753, LIFEBOOK E743 and LIFEBOOK E733.

Built with maximum durability and security for business travellers, the latest LIFEBOOK E Series notebooks are equipped with the latest 3rd Generation Intel Core processors up to i7.

“Our customers are embracing mobility in their everyday corporate lives and Fujitsu understands this paradigm shift,” said Mr. Lim Teck Sin, Vice President, Product Marketing & Engineering, Fujitsu PC Asia Pacific Pte Ltd.

They also sport the Mobile Intel QM77 chipset with vPro supported.

The LIFEBOOK E753 with its slim form factor features a brilliant 15.6” display, a variety of interfaces and high-end security features for ultimate work efficiency.

LIFEBOOK E743 comes with a 14” display and weighs only 1.9kg, offering greater convenience in the office.

The LIFEBOOK E733 comes with the right balance of portability and functionality featuring a 13.3” display and weighs a mere 1.7kg.

Full-fledged features packed into its small form factor makes it the ultimate choice for business individuals on-the-go.

Lower cost for the IT department

(more…)

Trend Micro tips against Iron Man 3 fake screening sites

Tuesday, May 7th, 2013

With the popularity of Iron Man 3, cybercriminals are using social networks to spread links to websites that purport to offer free screenings of the blockbuster – but instead lead to potentially malicious sites.

Be wary of links to websites offering free streaming or download of Iron Man 3 movie.

Be wary of links to websites offering free streaming or download of Iron Man 3 movie.

The scams utilised popular blogging platforms and social networks, such as Tumblr, WordPress and Blogger, to trick home viewers into downloading video installer files and click on malicious links and adware that may lead to survey scams and spam.

The same is seen on Facebook, where links to supposed Iron Man 3 streaming sites lead users to survey scams instead.

Some sites do not even lead to actual Iron Man 3 movie content, instead asking users to register and provide their credit card number – a move that is highly suspicious.

Here are some tips from Trend Micro for movie buffs to stay vigilant online.

  1. (more…)

Samsung Knox approved by DoD for use by US Government

Monday, May 6th, 2013

The U.S. Department of Defense (DoD) has approved mobile devices enabled with Samsung Knox for use in DoD networks, after the Defense Information Systems Agency (DISA) finished the testing of Samsung Knox devices.

Samsung KNOX is a comprehensive enterprise mobile solution that addresses the mobile security needs of enterprise IT without invading the privacy of its employees.

Samsung KNOX is a comprehensive enterprise mobile solution that addresses the mobile security needs of enterprise IT without invading the privacy of its employees.

What does this mean for consumers?

“Samsung Knox delivers fundamental security at the platform level, while leaving the user experience consistent,” said Injong Rhee, Senior Vice President and Head of B2B R&D Group, Samsung Electronics.

It means that Samsung devices equipped with Knox are so secure that even the US DoD has approved its use in its internal networks.

The recently launched GALAXY S4, for instance, is Knox ready.

It also means that enterprise IT administrators can sleep easier if their employees use their Knox-enabled mobile devices for both work and personal stuff.

Apart from Knox on the GALAXY, DISA also approved BlackBerry Enterprise Service 10 on BlackBerry’s Z10 and Q10 smartphones, as well as PlayBook tables.

(more…)

Trend Micro unveils Smart Protection Strategy for enterprises

Tuesday, April 9th, 2013

With the rise of targeted attacks, Trend Micro urges enterprises to redefine their security strategy to focus on the three C’s: Custom Defense, Complete End User Protection and Cloud Security.

Trend Micro celebrates 25 years this year, since its founding in 1988.

Trend Micro celebrates 25 years this year, since its founding in 1988.

With perimeter defense and conventional security becoming less effective against advanced targeted attacks, Trend Micro today announced the launch of Smart Protection Strategy to help enterprises redefine their security strategy in the wake of more sophisticated, stealthy and persistent cyber threats.

Eva Chen – CEO and Co-Founder, Trend Micro – described in detail the company’s Smart Protection Strategy at the annual Trend Micro APAC Media Summit 2013 in Singapore today.

JD Sherry – Global Director of Technology and Solutions, Trend Micro – then shared his perspective on the rapidly changing threat landscape, proposing how he believes cyber defence could be carried out in the new cloud era.

The three tenets of Trend Micro’s Smart Protection Strategy are extracted from the company’s press release and appended below. The full press release may be viewed/downloaded here.

(more…)

Singapore Mobile usage trends according to Norton by Symantec

Sunday, March 17th, 2013

Some insights from the Norton Cybercrime Report 2012 based on a survey conducted in July last year. (* All percentages are based on % of Singaporeans)

Top mobile Internet activities of Singaporeans.

Top mobile Internet activities of Singaporeans.

The report found that Singaporeans love to access the Internet on their mobile devices and they feel very safe doing so.

This could result in complacency where a notable percentage choose not to use mobile security – an alarming statistic, given how addicted they are to their mobile devices.

How safe do Singaporeans feel?

How safe do Singaporeans feel?

Need for their mobile devices *

  • 84% use their mobiles phones to connect to the Internet.
  • 55% consider themselves addicted to their mobile devices.
  • If they could choose two items to save from a fire, 49% would save their mobile device.

(more…)

Review: Norton 360 Multi-Device protection for all your devices

Wednesday, February 27th, 2013

Norton 360 Multi-Device is a security software suite that protects Windows and Mac desktops and notebooks, as well as Android and iOS tablets and smartphones from Cyber-criminals.

A one-year subscription of S$118.99 includes licenses for the software to be installed on five devices (regardless of users).

Norton 360 Multi-Device works on Windows PCs, Macs, Android and iOS smartphones and tablets.

Norton 360 Multi-Device works on Windows PCs, Macs, Android and iOS smartphones and tablets.

Many people today possess multiple devices – a home desktop computer, a notebook, a tablet and a smartphone.

And we use all these to access the Web for online activities – surfing, banking, social networking etc – which opens our devices and us to cyber-criminals out there in the Wild Wild Web.

Main user interface for Norton 360 Multi-Device showing the main functionalities for Security, Identity, Backup and Tuneup.

Main user interface for Norton 360 Multi-Device showing the main functionalities for Security, Identity, Backup and Tuneup.

Our personal information and passwords could be stolen, as well as confidential work documents, even our identity.

It is therefore paramount to safeguard our devices and ourselves when going online.

Norton 360 Multi-Device scans your disks, programs and even your Facebook Wall.

Norton 360 Multi-Device scans your disks, programs and even your Facebook Wall.

It can be a quite a hassle to evaluate, install, and manage different security software on individual devices separately.

Norton 360 Multi-Device offers a one-stop security solution for users to protect up to five different devices with a single one-year license.

(more…)

Top 10 tips for a safer Internet – for our children and for us

Tuesday, February 5th, 2013

Today is the Safer Internet Day, a global campaign that promotes for everyone a healthier Internet. Started in 2004, this year marks the 10th anniversary of the annual campaign that is held on the second day of the second week of February since 2004.

Effendy Ibrahim, Norton Internet Safety Advocate and Director for Asia, Norton by Symantec, has provided a list of top 10 tips for parents and caregivers for ensuring young people remain protected online. Click to view/download enlarged PDF version.

Effendy Ibrahim, Norton Internet Safety Advocate and Director for Asia, Norton by Symantec, has provided a list of top 10 tips for parents and caregivers for ensuring young people remain protected online. Click to view/download enlarged PDF version.

Safer Internet Day is organised by Insafe and co-founded by the European Union, in order to encourage safer and more responsible use of online technologies and services.

(more…)

IT Trends: Security in a time of convergence

Thursday, January 10th, 2013

Going into 2013, it’s a good time to look ahead at what enterprises should look out for in terms of working securely this year.

Let’s hear from Sugiarto Koh – Regional Director, ASEAN & North Asia, Sourcefire.

Sugiarto Koh, Regional Director, ASEAN & North Asia, Sourcefire

Sugiarto Koh, Regional Director, ASEAN & North Asia, Sourcefire

Sugiarto Koh opines that advanced malware and targeted attacks pose the greatest challenge for today’s security infrastructure and methods of protection.

Customers are struggling to find solutions that provide effective protection against the latest threats without over-burdening their budgets or sacrificing operational efficiency.

Below are Koh’s take on three major Enterprise IT trends and their implications.

(more…)

IT Trends: Dell shares its technology outlook for 2013

Monday, January 7th, 2013

What are Dell’s foci for 2013. Transforming, Connecting, Informing and Protecting – says Ng Tian Beng, Managing Director, Dell South Asia & Korea.

Ng Tian Beng, Managing Director, Dell South Asia & Korea

Ng Tian Beng, Managing Director, Dell South Asia & Korea

Based on feedback from his customers, Tian Beng highlights two common issues that keep  them awake at night.

  1. Firstly, businesses are spending too much of their IT budget on powering their datacenter and not powering their business.
  2. Secondly, customers want solutions that are help them innovate rather than merely keep the lights on.

Ng anticipates that, in 2013, the technology priorities of Dell’s customers along 4 key themes – Transform, Connect, Inform and Protect.

Below are the details of the four themes.

(more…)

Movie preview: Cybergeddon – Norton helps CSI Anthony Zuiker

Thursday, September 20th, 2012

I just watched an interesting movie – its about how three protagonists ATTEMPT to thwart evil cracker Gustov Dobreff from taking over the world.

Produced by CSI creator, Anthony E. Zuiker, the show reveals the growing threat of cybercrime in a realistic and entertaining way.

Update (25 September, 2012):

The first three episodes of Cybergeddon has been released at 1pm today. The remaining six webisodes will be released over the next two days. Catch the movie at Yahoo!

Also check out “Cybergeddon” app – the free mobile game on the Apple App Store for the iPhone, iPod touch and iPad; as well as Google Play store for Android devices.

Cybergeddon, Anthony E. Zuiker's digital blockbuster will premiere globally on Tuesday, 25 September.

Cybergeddon, Anthony E. Zuiker’s digital blockbuster will premiere globally on Tuesday, 25 September.

Cybergeddon follows agent Chloe Jocelyn (Missy Peregrym) as she investigates a slew of seemingly unrelated cyber-attacks with fellow agent Frank Parker (Manny Montana) and incarcerated master hacker Chase ‘Rabbit’ Rosen (Kick Gurry).

Anthony E. Zuiker and Missy Peregrym on the set of Cybergeddon in Toronto, Canada.

Anthony E. Zuiker and Missy Peregrym on the set of Cybergeddon in Toronto, Canada.

In a world where everyone is connected, Chloe and her team must break the worldwide cybercrime ring led by Gustov Dobreff (Olivier Martinez) before it is too late.

Olivier Martinez (from Unfaithful) acts as villain Gustov Dobreff.

Olivier Martinez (from “Unfaithful”) acts as villain Gustov Dobreff.

The “movie” is actually a web serial comprising 9 webisodes to be released on Yahoo! over a period of three consecutive days starting 25 September 2012 (Tuesday).

Cybergeddon will debut in over 25 countries and 10 languages.

The digital blockbuster was produced in Toronto, Canada and puts the spotlight on the growing threat of cybercrime, identity theft and vulnerabilities in our highly connected and digital lives.

Missy Peregrym (from "Rookie Blue") acts as heroine Chloe Jocelyn.

Missy Peregrym (from “Rookie Blue”) acts as heroine Chloe Jocelyn.

Norton by Symantec consulted directly with the projects’ creators to lend credibility and technical insights that helped inform the narrative and led to the creation of a cybersecurity character in the film.

Kick Gurry (from "Speed Racer") as master hacker Chase 'Rabbit' Rosen.

Kick Gurry (from “Speed Racer”) as master hacker Chase ‘Rabbit’ Rosen.

I found the show struck a good balance between technical depth and entertainment value.

Missy Peregrym's character is framed by the villain in Cybergeddon.

Missy Peregrym’s character is framed by the villain in Cybergeddon.

There was an adequate supply of technical jargon to appease the informed hacker in the audience without boring the living daylights out of the layman viewer.

Manny Montana (from "Breakout Kings") acts as agent and unwilling partner Frank Parker.

Manny Montana (from “Breakout Kings”) acts as agent Frank Parker.

In fact, well-designed animation was used to illustrate abstract hacking processes to help audiences appreciate the complexities and progress of various hacking processes.

Missy Peregrym in the Norton Security Operations Center (NSOC) in Cybergeddon.

Missy Peregrym in the Norton Security Operations Center (NSOC) in Cybergeddon.

The pace of the movie was maintained throughout so that the show felt like a regular action thriller – actually, there was plenty of chase and fight scenes, complete with pyrotechnics and gory stabs so even if you don’t understand any of the hacking bits, you can still enjoy the flick.

Re-creation of the Norton Security Operations Center (NSOC) for Cybergeddon.

Re-creation of the Norton Security Operations Center (NSOC) for Cybergeddon.