Thursday, November 21, 2013

How to Protect Your Android Device from Malware


 
If you're in the majority of Android users, your smartphone or tablet isn't protected from malware attacks. In fact, Jupiter Research reckons that a full 80 percent of smartphones are unprotected.

Why is that a problem? The answer is that even if your smartphone hasn't been affected so far, it likely will be, and that's because of the vast sums of money motivating criminals to seek out and capture financial data, passcodes, and other potentially profitable information. The more machines, the more money.

Until phone makers address the potential issue more thoroughly, it's in your interest to secure your device with a few easy-to-implement steps.

Step 1: Download apps from trusted sources only.

The Google Play store is a trusted source. It's the official app-distribution channel and it regularly scans apps for malicious code and removes malware apps that it finds. Amazon, meanwhile, says it tests apps before publishing them to its store.

There are other trustworthy sources out there as well, but be aware that most Android malware comes from third-party sites.

Risk Tip: Some app stores may ask you to turn on a device-based setting, which can allow the device to install apps from "unknown" sources. Be aware that this is risky.


Step 2: Avoid sideloading from questionable sources.

Sideloading is the disabling of Android security, downloading and then running of APK files -- look for the .apk extension. APK files are the program files, similar to the EXE files in the Windows OS.

While it's not inherently dangerous to use an APK file rather than the Google Play store to load an app, it is when the source is questionable.

Risk Tip: You can reckon that any source offering paid apps for free is questionable.


Step 3: Learn to identify fake apps.

Apply the same techniques that you use to identify rogue emails from bogus financial institutions, like pixelated, poorly rendering logos, spelling mistakes, and publisher names that don't match the official spelling or wording -- for example, "Blackberry" rather than the official "BlackBerry."

Risk Tip: Some organizations outsource their app development, resulting in mismatched publisher names. Perform a Google search on the labeled publisher and gauge the app's legitimacy based on that.


Step 4: Question apps that don't appear to do much.

Read through the app reviews in the Google Play store. Make sure that the user reviews indicate that the app does what it says it does.

Risk Tip: Apps that request your email can be the source of annoying promotional mailings.

Step 5: Install security software.

Major PC security vendors like AVG and Norton make antivirus apps for Android too. The apps detect and remove viruses, malware and spyware. They often also have additional benefits that make handing over any money more palatable, like phone locating via Google Maps and locking or wiping functions.
 
Source From: http://www.technewsworld.com/story/How-to-Protect-Your-Android-Device-from-Malware-79469.html

Tuesday, November 12, 2013

My Experience in Malaysia Airports


As we know Malaysia Airports is the monopoly airport operators company in Malaysia. All airports in Malaysia was operate by Malaysia Airports. I’m being here almost 6 years. There are a lot of experience I have got here especially in Airports Operations. This is interesting experience that not most people will get rather than working with Malaysia Airport.

Begin as a training coordinator for engineering courses at Malaysia Airports. It was motivate me to learn and explore the technology existing in KLIA. Surprisingly, there are a lot of technology that we never know such as PBB (Passenger Boarding Bridge), Baggage Handling System (BHS), AGL (Airfield Ground Lighting) and FIDS (Flight Information Display System). All of this technology are integrated into one system call “Total Airport Management System” or TAMS.

While I was in Training Management Department. I have coordinate a lot of courses related to engineering in Malaysia Airports which is PBB (Passenger Boarding Bridge) course, Baggage Handling System (BHS) course, AGL (Airfield Ground Lighting) course and many more.

It was a good experience for me to enhance my knowledge on Airport Operations. When I was young, my ambition is to be a part of airport staff and now is happen and will be a journey for me to be a specialist in airport industry =)

 This is one of the expensive car to identified the breakdown of AGL (Airfield Ground Lighting)
 
 
 This is Passenger Boarding Bridge @ KLIA
 

 This is a tunnel of Passenger Boarding Bridge

 This is called VDGS (Visual Docking Guidance System). This system will use by Pilot to guide them when park their aircraft at Apron Zone


This how Passenger Boarding Bridge works =)
 
 During Training Session
 
Me at Airside Operation KLIA
 

KLIA TV - OFFICIAL BROADCASTER FOR MALAYSIA AIRPORTS



THE e-FIDS FEATURE



Seeing is believing with our most premium spot for advertising at the airport - the Electronic Flight Information Display System (e-FIDS). Advertisers can imagine their brands being seen via a combination of 70 units of 46" Large Format Display (LFDs) on the most watched screen in the airport. Located at the Customer Information Centre (CIC) of the International / Domestic Departure hall, the e-FIDS display is a feature every traveler and airport visitor will not miss. The supporting technology behind this service is the Vestigia tracking system as a smart partnerships with KLIATV which is designed to monitor the movement of vehicles such as airplanes, trains or automobiles that gas a time relationship with geography. Powered by Titanclass, this first of its kind systems is a revolution in global communications, allowing first of its kind system is a revolution in global communications, allowing geographically related information to be displayed in a relevant and informative manner on a 2 or 3 dimensional form using stunning imagery in a global or rectilinear view.

In the field of airport advertising, frequent travelers, being the cream of the crop, are a very special group of consumers usually regarded to be wealthy, highly educated and discerning shoppers. Since airline travelers have always been a strong target for business-to-business advertisers, KLIATV serves as the latest media solution to provide an engaging, noticeable and ubiquitous advertising opportunity, uniquely placed to provide solutions to meet current global marketing challenges. With the presence of KLIATV, our major airline gateways are being furnished with 500 units of Samsung LED TVs (400 units of 46" and 55" TVs at KLIA and 100 units of 46" TVs at LCCT). KLIATV comes with the latest multi standard 'Wifi Transmission' technology utilizing satellite connectivity for simultaneous channel transmission throughout KLIA, LCCT and other airports nationwide


Vestigia is a tracking system designed to monitor the movement of airplanes, trains or automobiles - in short, any vehicles or object has a time relationship with geography.


Using flight data which is ultimately sourced from each airline and includes accurate Estimated Time of Arrival (ETA) or typical flights arriving into an airport, either in real time or predictively, with consideration of multiple legs and stop-overs.


Vestigia is degined to be customised to meet an organisation's specific needs. It can improve brand awareness at a fraction of the cost of traditional methods, as it impresses and captivates audiences at whichever location it is positioned at.


Source from: http://kliatv.com.my/technology.html

Don’t Let Your Social Media Accounts Get Hacked


Password security is extremely important in protecting both account access, and your company’s reputation. While most hacks target websites, your organizations social media accounts present an attractive target for hackers. Don’t be fooled by thinking otherwise

Put Procedures In Place For Handling Company Passwords

Simply having the right policies and procedures can go a long way in protecting your business from hacks and compromised accounts. You should set clear rules for how company login credentials are handled (who has access, restrictions, rules, etc).

One important thing to remember is that there are plenty of solutions that allow accounts to be managed without having password access. In cases where multiple employees access company social media accounts, you should invest in a social media management dashboard. There are a lot of options, but the most notable are Sprout Social or Hootsuite. The added benefit of this is it makes brand monitoring streamlined and simple – making it easier for you to respond to customers in real-time.

These tools allow users to be assigned a unique login, and all of their activity will be accounted for. Another strong benefit of using tools like this is that there is no need to share the password. They will be able to post to social media and interact with followers and customers from the software dashboard. The less people that know company passwords, the better.

Managing Your Passwords At The Management Level

Of course at the end of the day, regardless of who has access at what, chances are you have a ton of passwords to manage. This can present a problem to larger business (or firms with many accounts).

There are potential risks when managing a large amount of access data. Here are the two scenarios most most people in this position face:

  • For convenience, you use one password for all of your accounts. This exponentially increases the damage that could be done should your password become compromised. Think about it. Most hackers rely on patterns and behavior. Most people use the same password. This truth presents an opportunity for cyber thieves, and an impediment for businesses.
  • Forgetting your passwords because you cannot remember them all. While you may be more secure from hackers, it does you no good if you’re the one who cannot log in.
Here is how to solve both of these problems with one good solution: use a password manager.

Password managers can be implemented using browser extensions, software or USB drives. Roboform and PassPack are both encrypted solutions to storing passwords, each with its own unique set of features. They allow you to add users and store all of your passwords encrypted. Some solutions even have browser extensions that allow for quick login when accessing sites. No extensive computer/server modifications are necessary, making them easy to install.

There are more solutions than the ones mentioned. You should definitely do the research and explore a solution that will work best within your company.

Tips For Creating Secure Passwords

Although password managers may be convenient users should recognize that they should still use the program responsibly and set up secure passwords that are not easy to guess. Passwords should never simply be a single word. The most secure passwords use a combination of alpha-numeric characters – with caps and special characters to boot.

Hacker’s have software like keyloggers or password generators that can detect common keystrokes on a network in order to steal your passwords. In order to make it harder for keystrokes to detect passwords different passwords should be used for every single account. That way if one account is breached it will not put all your accounts at risk.

Although choosing several different passwords makes management harder to remember, your password management software will save all these keyphrases for you and your employees. In addition to storing multiple passwords the software will also encrypt the data for you so that it is not easy for outsiders to retrieve. When an employee needs a password to access an account they can do so using a special thumbdrive application, browser application, or smart card application as mentioned before.

Source from :http://blog.rivalhost.com/business-password-management-tips/

Monday, October 21, 2013

iPhone 6: Release date, rumours, features and news



The iPhone 5S has had its ‘coming out’ party, with Apple unveiling its most forward-thinking phone yet. It’s got a fingerprint sensor for added security and convenience, a retooled camera module, new colour scheme and its most advanced processor yet.

From what we've seen thus far, the 5S is looking like more than a match for the current crop of high-end Android phones out there, thanks to the added benefits of iOS 7 and some great looking iPhone 5s apps. Just check out our iPhone 5s vs. Samsung Galaxy S4 to see how it stacks up against the competition.

However, as is always the case with Apple, the world is already wondering what comes next? What will the iPhone 6 – expected to be a much more expansive update – bring to the table?

iPhone 6 release date

Unless Apple dramatically changes course from its release schedule, we’re unlikely to see the iPhone 6 arrive on the scene until September 2014. However, it has been whispered that the company will launch a larger iPhone 6 as a companion to the iPhone 5S. In that case, we would be looking at a release date perhaps prior Samsung’s May/June new Galaxy window.

Apple iPhone 6 screen size

Recent reports from the Wall Street Journal have indicated that Apple is experimenting with screens ranging from 4.5- to 6-inches. Apple had to be dragged kicking and screaming from its classic 3.5-inch handset to the iPhone 5 and 5S’ 5-inch screen, but speculation suggests it is willing to push closer to the 5-inch screens offered by some of its Android rivals.
According to MacRumors, one analyst has suggested that Apple could be looking to implement a 4.8-inch Retina+ IGZO screen made by Sharp, which will make the iPhone 6 display thinner, brighter and much clearer – boasting better than HD resolutions.

Apple iPhone 6 storage

In the build up to the iPhone 5S launch analysts predicted the company would boost the storage of the device to 128GB, up from the top-end 64GB handset. That speculation will now carry over to the iPhone 6. That would tie in with the recent addition of a 128GB iPad model. Why couldn’t Apple employ the same tech here?

Apple iPhone 6 specs

In the build up to the iPhone 5S launch event, an Apple patent was uncovered for a fingerprint sensor that integrated Near Field Communications technology, enabling wireless payments, data transfers, media playback and more. The NFC chip was a no show. Might it be integrated within the iPhone 6?
The iPhone 5S also saw a brand new A7 processor, that’s 40 per cent faster than the A6 and a new M7 motion co-processor that tracks the users movement. We’d expect this tech to evolve in the iPhone 6 handset. Apple is yet to launch a quad-core handset. Will 2014 see it make the jump?
The device’s camera also just got a pretty significant update thanks to a 15 per cent larger sensor and a dual LED flash. There’s also new software features TrueTone flash firing, Burst Mode and slow motion video. We can only envision Apple will further hone this tech within the iPhone 6. Will we see a 13-megapixel sensor to replace the 8-megapixel snapper on the iPhone 5 and 5S?
Naturally, there’ll be the latest Wi-Fi, 4G and Bluetooth technologies.

Apple iPhone 6 appearance

Apple's iPhone 6 may have a curved, wraparound screen, according to a recent Apple patent filing. The patent shows off an iPhone design with a wraparound AMOLED screen, which appears to be similar in design to the fourth generation iPod Nano, has gained particular attention.
According to the patent the screen can be 'unrolled' or 'unfolded' thanks to a hinge or unfolding mechanism allowing the screen area to be almost doubled in size. Facial-recognition, gesture control and the layering of screens to create a 3D display were also described in the patent.

Apple iPhone 6 features

A new feature that could well appear on the 6th generation iPhone is the use of sonar as a replacement to the current infared sensors which use sound as a proximity sensor – according to this report in Apple Insider – letting the phone detect where it is, either as a way of alerting the user about an incoming object, or as a way of detecting whether the phone is being held to the users ear.
One of the intriguing features to appear on several rumour feeds is the introduction of a “smart bezel” which would display information around the screen. It emerged from an actual patent that Apple filed and, according to Macworld, the smart bezel could be a place for flashing buttons and symbols that compliment the on-screen action.
The patent states: "The primary display could be used to convey visual content to a user, and the secondary display could be used to guide a user providing inputs to the device. For example, the secondary display could be selectively illuminated to provide one or more indicators that represent where or how a user can provide inputs to the device."

Apple iPhone 6 Operating System

Unless Apple breaks from tradition and launches an iPhone 6 in the middle of the iPhone 5S release cycle, it seems that the iPhone 6 will arrive with iOS 8 out of the box. With iOS 7 bringing a much-needed visual overhaul for Apple’s mobile software, it seems unlikely that Apple will be reinventing the wheel again so soon.

My Journey at London



 London Bridge....=)
 

 My House Coming Soon..=)
 
 At UCL (University College of London) Career Fair
 


Finally i'm here..=)