Archive for the ‘Security’ Category
Wednesday, May 8th, 2013
Fujitsu today unveiled its slimmest business notebooks: LIFEBOOK E753, 743, and E733. Available from June 2013.

From Left – Fujitsu LIFEBOOK E753, LIFEBOOK E743 and LIFEBOOK E733.
Built with maximum durability and security for business travellers, the latest LIFEBOOK E Series notebooks are equipped with the latest 3rd Generation Intel Core processors up to i7.
“Our customers are embracing mobility in their everyday corporate lives and Fujitsu understands this paradigm shift,” said Mr. Lim Teck Sin, Vice President, Product Marketing & Engineering, Fujitsu PC Asia Pacific Pte Ltd.
They also sport the Mobile Intel QM77 chipset with vPro supported.
The LIFEBOOK E753 with its slim form factor features a brilliant 15.6” display, a variety of interfaces and high-end security features for ultimate work efficiency.
LIFEBOOK E743 comes with a 14” display and weighs only 1.9kg, offering greater convenience in the office.
The LIFEBOOK E733 comes with the right balance of portability and functionality featuring a 13.3” display and weighs a mere 1.7kg.
Full-fledged features packed into its small form factor makes it the ultimate choice for business individuals on-the-go.
Lower cost for the IT department
(more…)
Tags:business, Fujitsu, laptop, Lifebook, Microsoft, notebook, Singapore, Windows, Windows 8
Posted in Announce, Fujitsu, Gadgets, Notebooks, Prices, Security, Specifications, Windows 8 | No Comments »
Tuesday, May 7th, 2013
With the popularity of Iron Man 3, cybercriminals are using social networks to spread links to websites that purport to offer free screenings of the blockbuster – but instead lead to potentially malicious sites.

Be wary of links to websites offering free streaming or download of Iron Man 3 movie.
The scams utilised popular blogging platforms and social networks, such as Tumblr, WordPress and Blogger, to trick home viewers into downloading video installer files and click on malicious links and adware that may lead to survey scams and spam.
If you’re unsure about the legitimacy of the links you come across online, you may verify the nature of the a link before you visit it by checking the URL at
Trend Micro Site Safety.
The same is seen on Facebook, where links to supposed Iron Man 3 streaming sites lead users to survey scams instead.
Some sites do not even lead to actual Iron Man 3 movie content, instead asking users to register and provide their credit card number – a move that is highly suspicious.
Here are some tips from Trend Micro for movie buffs to stay vigilant online.
- (more…)
Tags:Blogger, cybercriminals, Facebook, security, Trend Micro, Tumblr, Wordpress
Posted in Facebook, Internet, Security, Trend Micro, Website | No Comments »
Monday, May 6th, 2013
The U.S. Department of Defense (DoD) has approved mobile devices enabled with Samsung Knox for use in DoD networks, after the Defense Information Systems Agency (DISA) finished the testing of Samsung Knox devices.

Samsung KNOX is a comprehensive enterprise mobile solution that addresses the mobile security needs of enterprise IT without invading the privacy of its employees.
What does this mean for consumers?
“Samsung Knox delivers fundamental security at the platform level, while leaving the user experience consistent,” said Injong Rhee, Senior Vice President and Head of B2B R&D Group, Samsung Electronics.
It means that Samsung devices equipped with Knox are so secure that even the US DoD has approved its use in its internal networks.
The recently launched GALAXY S4, for instance, is Knox ready.
It also means that enterprise IT administrators can sleep easier if their employees use their Knox-enabled mobile devices for both work and personal stuff.
Apart from Knox on the GALAXY, DISA also approved BlackBerry Enterprise Service 10 on BlackBerry’s Z10 and Q10 smartphones, as well as PlayBook tables.
(more…)
Tags:BES, BlackBerry, Galaxy, Knox, Q10, S4, Samsung, security, smartphones, tablets, Z10
Posted in Announce, BlackBerry, BlackBerry 10, Enterprise IT, Gadgets, Galaxy, GALAXY, Phones, Q10, RIM, S4, Samsung, Security, Software, Tablets, Z10 | No Comments »
Tuesday, April 9th, 2013
With the rise of targeted attacks, Trend Micro urges enterprises to redefine their security strategy to focus on the three C’s: Custom Defense, Complete End User Protection and Cloud Security.

Trend Micro celebrates 25 years this year, since its founding in 1988.
With perimeter defense and conventional security becoming less effective against advanced targeted attacks, Trend Micro today announced the launch of Smart Protection Strategy to help enterprises redefine their security strategy in the wake of more sophisticated, stealthy and persistent cyber threats.
The Smart Protection Strategy covers three focus areas with new solution concepts –
- custom defense against customised targeted cyber-attacks
- complete end user protection for exchange of information in today’s bring-your-own-device (BYOD) era
- cloud security optimised for data centers.
Eva Chen – CEO and Co-Founder, Trend Micro – described in detail the company’s Smart Protection Strategy at the annual Trend Micro APAC Media Summit 2013 in Singapore today.
JD Sherry – Global Director of Technology and Solutions, Trend Micro – then shared his perspective on the rapidly changing threat landscape, proposing how he believes cyber defence could be carried out in the new cloud era.
The three tenets of Trend Micro’s Smart Protection Strategy are extracted from the company’s press release and appended below. The full press release may be viewed/downloaded here.
(more…)
Tags:attacks, BYOD, cloud, cyber, datacenters, defence, media, security, seminar, Singapore, Trend Micro
Posted in Cloud, Enterprise IT, Events, Figures, Mobile, Security, Seminars, Software, Technology, Trend Micro | No Comments »
Sunday, March 17th, 2013
Some insights from the Norton Cybercrime Report 2012 based on a survey conducted in July last year. (* All percentages are based on % of Singaporeans)

Top mobile Internet activities of Singaporeans.
The report found that Singaporeans love to access the Internet on their mobile devices and they feel very safe doing so.
This could result in complacency where a notable percentage choose not to use mobile security – an alarming statistic, given how addicted they are to their mobile devices.

How safe do Singaporeans feel?
Need for their mobile devices *
- 84% use their mobiles phones to connect to the Internet.
- 55% consider themselves addicted to their mobile devices.
- If they could choose two items to save from a fire, 49% would save their mobile device.
(more…)
Tags:cybercrime, mobile, Norton, security, Singapore, Symantec
Posted in Announce, Figures, Gadgets, Norton, Phones, Security, Software, Study, Tablets | No Comments »
Wednesday, February 27th, 2013
Norton 360 Multi-Device is a security software suite that protects Windows and Mac desktops and notebooks, as well as Android and iOS tablets and smartphones from Cyber-criminals.
A one-year subscription of S$118.99 includes licenses for the software to be installed on five devices (regardless of users).

Norton 360 Multi-Device works on Windows PCs, Macs, Android and iOS smartphones and tablets.
Many people today possess multiple devices – a home desktop computer, a notebook, a tablet and a smartphone.
And we use all these to access the Web for online activities – surfing, banking, social networking etc – which opens our devices and us to cyber-criminals out there in the Wild Wild Web.

Main user interface for Norton 360 Multi-Device showing the main functionalities for Security, Identity, Backup and Tuneup.
Our personal information and passwords could be stolen, as well as confidential work documents, even our identity.
It is therefore paramount to safeguard our devices and ourselves when going online.

Norton 360 Multi-Device scans your disks, programs and even your Facebook Wall.
It can be a quite a hassle to evaluate, install, and manage different security software on individual devices separately.
Norton 360 Multi-Device offers a one-stop security solution for users to protect up to five different devices with a single one-year license.
(more…)
Tags:mobile, Norton, online, security, Symantec
Posted in All-in-One, Android, Desktops, Gadgets, iOS, Mac, Mac OS, Norton, Notebooks, Phones, Prices, Review, Security, Software, Specifications, Tablets, Utility, Windows 7, Windows 8 | 2 Comments »
Tuesday, February 5th, 2013
Today is the Safer Internet Day, a global campaign that promotes for everyone a healthier Internet. Started in 2004, this year marks the 10th anniversary of the annual campaign that is held on the second day of the second week of February since 2004.

Effendy Ibrahim, Norton Internet Safety Advocate and Director for Asia, Norton by Symantec, has provided a list of top 10 tips for parents and caregivers for ensuring young people remain protected online. Click to view/download enlarged PDF version.
Safer Internet Day is organised by Insafe and co-founded by the European Union, in order to encourage safer and more responsible use of online technologies and services.
(more…)
Tags:Internet, Norton, safety, security, Symantec
Posted in Howtos, Infographic, Internet, Norton, Reference, Security | 1 Comment »
Thursday, January 10th, 2013
Going into 2013, it’s a good time to look ahead at what enterprises should look out for in terms of working securely this year.
Let’s hear from Sugiarto Koh – Regional Director, ASEAN & North Asia, Sourcefire.

Sugiarto Koh, Regional Director, ASEAN & North Asia, Sourcefire
Sugiarto Koh opines that advanced malware and targeted attacks pose the greatest challenge for today’s security infrastructure and methods of protection.
Three major Enterprise IT trends that will continue to impact security.
- Mobile computing
- Social media
- BYOD
Customers are struggling to find solutions that provide effective protection against the latest threats without over-burdening their budgets or sacrificing operational efficiency.
Below are Koh’s take on three major Enterprise IT trends and their implications.
(more…)
Tags:2013, BYOD, enterprise IT, forecast, mobile computing, predictions, security, social media, Sourcefire, trends
Posted in Enterprise IT, Interview, Opinion, Security | 2 Comments »
Monday, January 7th, 2013
What are Dell’s foci for 2013. Transforming, Connecting, Informing and Protecting – says Ng Tian Beng, Managing Director, Dell South Asia & Korea.

Ng Tian Beng, Managing Director, Dell South Asia & Korea
Based on feedback from his customers, Tian Beng highlights two common issues that keep them awake at night.
- Firstly, businesses are spending too much of their IT budget on powering their datacenter and not powering their business.
- Secondly, customers want solutions that are help them innovate rather than merely keep the lights on.
Ng anticipates that, in 2013, the technology priorities of Dell’s customers along 4 key themes – Transform, Connect, Inform and Protect.
Below are the details of the four themes.
(more…)
Tags:2013, Big Data, BYOD, cloud, DELL, enterprise IT, forecast, Outlook, predictions, security, technology, trends, virtualisation
Posted in Cloud, Dell, Enterprise IT, Interview, Opinion, Security | 2 Comments »
Thursday, September 20th, 2012
I just watched an interesting movie – its about how three protagonists ATTEMPT to thwart evil cracker Gustov Dobreff from taking over the world.
Produced by CSI creator, Anthony E. Zuiker, the show reveals the growing threat of cybercrime in a realistic and entertaining way.
Update (25 September, 2012):
The first three episodes of Cybergeddon has been released at 1pm today. The remaining six webisodes will be released over the next two days. Catch the movie at Yahoo!
Also check out “Cybergeddon” app – the free mobile game on the Apple App Store for the iPhone, iPod touch and iPad; as well as Google Play store for Android devices.

Cybergeddon, Anthony E. Zuiker’s digital blockbuster will premiere globally on Tuesday, 25 September.
Cybergeddon follows agent Chloe Jocelyn (Missy Peregrym) as she investigates a slew of seemingly unrelated cyber-attacks with fellow agent Frank Parker (Manny Montana) and incarcerated master hacker Chase ‘Rabbit’ Rosen (Kick Gurry).

Anthony E. Zuiker and Missy Peregrym on the set of Cybergeddon in Toronto, Canada.
In a world where everyone is connected, Chloe and her team must break the worldwide cybercrime ring led by Gustov Dobreff (Olivier Martinez) before it is too late.

Olivier Martinez (from “Unfaithful”) acts as villain Gustov Dobreff.
The “movie” is actually a web serial comprising 9 webisodes to be released on Yahoo! over a period of three consecutive days starting 25 September 2012 (Tuesday).
Cybergeddon debuts on 25 September (Tuesday) on Yahoo! with three webisodes released each day for three consecutive days.You can watch the trailer here.
Cybergeddon will debut in over 25 countries and 10 languages.
The digital blockbuster was produced in Toronto, Canada and puts the spotlight on the growing threat of cybercrime, identity theft and vulnerabilities in our highly connected and digital lives.

Missy Peregrym (from “Rookie Blue”) acts as heroine Chloe Jocelyn.
Norton by Symantec consulted directly with the projects’ creators to lend credibility and technical insights that helped inform the narrative and led to the creation of a cybersecurity character in the film.

Kick Gurry (from “Speed Racer”) as master hacker Chase ‘Rabbit’ Rosen.
I found the show struck a good balance between technical depth and entertainment value.

Missy Peregrym’s character is framed by the villain in Cybergeddon.
There was an adequate supply of technical jargon to appease the informed hacker in the audience without boring the living daylights out of the layman viewer.

Manny Montana (from “Breakout Kings”) acts as agent Frank Parker.
In fact, well-designed animation was used to illustrate abstract hacking processes to help audiences appreciate the complexities and progress of various hacking processes.

Missy Peregrym in the Norton Security Operations Center (NSOC) in Cybergeddon.
The pace of the movie was maintained throughout so that the show felt like a regular action thriller – actually, there was plenty of chase and fight scenes, complete with pyrotechnics and gory stabs so even if you don’t understand any of the hacking bits, you can still enjoy the flick.

Re-creation of the Norton Security Operations Center (NSOC) for Cybergeddon.
Tags:CSI, movie, Norton, preview, Symantec, Zuiker
Posted in Events, Exhibition, Internet, Lifestyle, Norton, Security, Shows, Software | No Comments »