Thursday, November 21, 2013

How to Protect Your Android Device from Malware


 
If you're in the majority of Android users, your smartphone or tablet isn't protected from malware attacks. In fact, Jupiter Research reckons that a full 80 percent of smartphones are unprotected.

Why is that a problem? The answer is that even if your smartphone hasn't been affected so far, it likely will be, and that's because of the vast sums of money motivating criminals to seek out and capture financial data, passcodes, and other potentially profitable information. The more machines, the more money.

Until phone makers address the potential issue more thoroughly, it's in your interest to secure your device with a few easy-to-implement steps.

Step 1: Download apps from trusted sources only.

The Google Play store is a trusted source. It's the official app-distribution channel and it regularly scans apps for malicious code and removes malware apps that it finds. Amazon, meanwhile, says it tests apps before publishing them to its store.

There are other trustworthy sources out there as well, but be aware that most Android malware comes from third-party sites.

Risk Tip: Some app stores may ask you to turn on a device-based setting, which can allow the device to install apps from "unknown" sources. Be aware that this is risky.


Step 2: Avoid sideloading from questionable sources.

Sideloading is the disabling of Android security, downloading and then running of APK files -- look for the .apk extension. APK files are the program files, similar to the EXE files in the Windows OS.

While it's not inherently dangerous to use an APK file rather than the Google Play store to load an app, it is when the source is questionable.

Risk Tip: You can reckon that any source offering paid apps for free is questionable.


Step 3: Learn to identify fake apps.

Apply the same techniques that you use to identify rogue emails from bogus financial institutions, like pixelated, poorly rendering logos, spelling mistakes, and publisher names that don't match the official spelling or wording -- for example, "Blackberry" rather than the official "BlackBerry."

Risk Tip: Some organizations outsource their app development, resulting in mismatched publisher names. Perform a Google search on the labeled publisher and gauge the app's legitimacy based on that.


Step 4: Question apps that don't appear to do much.

Read through the app reviews in the Google Play store. Make sure that the user reviews indicate that the app does what it says it does.

Risk Tip: Apps that request your email can be the source of annoying promotional mailings.

Step 5: Install security software.

Major PC security vendors like AVG and Norton make antivirus apps for Android too. The apps detect and remove viruses, malware and spyware. They often also have additional benefits that make handing over any money more palatable, like phone locating via Google Maps and locking or wiping functions.
 
Source From: http://www.technewsworld.com/story/How-to-Protect-Your-Android-Device-from-Malware-79469.html

Tuesday, November 12, 2013

My Experience in Malaysia Airports


As we know Malaysia Airports is the monopoly airport operators company in Malaysia. All airports in Malaysia was operate by Malaysia Airports. I’m being here almost 6 years. There are a lot of experience I have got here especially in Airports Operations. This is interesting experience that not most people will get rather than working with Malaysia Airport.

Begin as a training coordinator for engineering courses at Malaysia Airports. It was motivate me to learn and explore the technology existing in KLIA. Surprisingly, there are a lot of technology that we never know such as PBB (Passenger Boarding Bridge), Baggage Handling System (BHS), AGL (Airfield Ground Lighting) and FIDS (Flight Information Display System). All of this technology are integrated into one system call “Total Airport Management System” or TAMS.

While I was in Training Management Department. I have coordinate a lot of courses related to engineering in Malaysia Airports which is PBB (Passenger Boarding Bridge) course, Baggage Handling System (BHS) course, AGL (Airfield Ground Lighting) course and many more.

It was a good experience for me to enhance my knowledge on Airport Operations. When I was young, my ambition is to be a part of airport staff and now is happen and will be a journey for me to be a specialist in airport industry =)

 This is one of the expensive car to identified the breakdown of AGL (Airfield Ground Lighting)
 
 
 This is Passenger Boarding Bridge @ KLIA
 

 This is a tunnel of Passenger Boarding Bridge

 This is called VDGS (Visual Docking Guidance System). This system will use by Pilot to guide them when park their aircraft at Apron Zone


This how Passenger Boarding Bridge works =)
 
 During Training Session
 
Me at Airside Operation KLIA
 

KLIA TV - OFFICIAL BROADCASTER FOR MALAYSIA AIRPORTS



THE e-FIDS FEATURE



Seeing is believing with our most premium spot for advertising at the airport - the Electronic Flight Information Display System (e-FIDS). Advertisers can imagine their brands being seen via a combination of 70 units of 46" Large Format Display (LFDs) on the most watched screen in the airport. Located at the Customer Information Centre (CIC) of the International / Domestic Departure hall, the e-FIDS display is a feature every traveler and airport visitor will not miss. The supporting technology behind this service is the Vestigia tracking system as a smart partnerships with KLIATV which is designed to monitor the movement of vehicles such as airplanes, trains or automobiles that gas a time relationship with geography. Powered by Titanclass, this first of its kind systems is a revolution in global communications, allowing first of its kind system is a revolution in global communications, allowing geographically related information to be displayed in a relevant and informative manner on a 2 or 3 dimensional form using stunning imagery in a global or rectilinear view.

In the field of airport advertising, frequent travelers, being the cream of the crop, are a very special group of consumers usually regarded to be wealthy, highly educated and discerning shoppers. Since airline travelers have always been a strong target for business-to-business advertisers, KLIATV serves as the latest media solution to provide an engaging, noticeable and ubiquitous advertising opportunity, uniquely placed to provide solutions to meet current global marketing challenges. With the presence of KLIATV, our major airline gateways are being furnished with 500 units of Samsung LED TVs (400 units of 46" and 55" TVs at KLIA and 100 units of 46" TVs at LCCT). KLIATV comes with the latest multi standard 'Wifi Transmission' technology utilizing satellite connectivity for simultaneous channel transmission throughout KLIA, LCCT and other airports nationwide


Vestigia is a tracking system designed to monitor the movement of airplanes, trains or automobiles - in short, any vehicles or object has a time relationship with geography.


Using flight data which is ultimately sourced from each airline and includes accurate Estimated Time of Arrival (ETA) or typical flights arriving into an airport, either in real time or predictively, with consideration of multiple legs and stop-overs.


Vestigia is degined to be customised to meet an organisation's specific needs. It can improve brand awareness at a fraction of the cost of traditional methods, as it impresses and captivates audiences at whichever location it is positioned at.


Source from: http://kliatv.com.my/technology.html

Don’t Let Your Social Media Accounts Get Hacked


Password security is extremely important in protecting both account access, and your company’s reputation. While most hacks target websites, your organizations social media accounts present an attractive target for hackers. Don’t be fooled by thinking otherwise

Put Procedures In Place For Handling Company Passwords

Simply having the right policies and procedures can go a long way in protecting your business from hacks and compromised accounts. You should set clear rules for how company login credentials are handled (who has access, restrictions, rules, etc).

One important thing to remember is that there are plenty of solutions that allow accounts to be managed without having password access. In cases where multiple employees access company social media accounts, you should invest in a social media management dashboard. There are a lot of options, but the most notable are Sprout Social or Hootsuite. The added benefit of this is it makes brand monitoring streamlined and simple – making it easier for you to respond to customers in real-time.

These tools allow users to be assigned a unique login, and all of their activity will be accounted for. Another strong benefit of using tools like this is that there is no need to share the password. They will be able to post to social media and interact with followers and customers from the software dashboard. The less people that know company passwords, the better.

Managing Your Passwords At The Management Level

Of course at the end of the day, regardless of who has access at what, chances are you have a ton of passwords to manage. This can present a problem to larger business (or firms with many accounts).

There are potential risks when managing a large amount of access data. Here are the two scenarios most most people in this position face:

  • For convenience, you use one password for all of your accounts. This exponentially increases the damage that could be done should your password become compromised. Think about it. Most hackers rely on patterns and behavior. Most people use the same password. This truth presents an opportunity for cyber thieves, and an impediment for businesses.
  • Forgetting your passwords because you cannot remember them all. While you may be more secure from hackers, it does you no good if you’re the one who cannot log in.
Here is how to solve both of these problems with one good solution: use a password manager.

Password managers can be implemented using browser extensions, software or USB drives. Roboform and PassPack are both encrypted solutions to storing passwords, each with its own unique set of features. They allow you to add users and store all of your passwords encrypted. Some solutions even have browser extensions that allow for quick login when accessing sites. No extensive computer/server modifications are necessary, making them easy to install.

There are more solutions than the ones mentioned. You should definitely do the research and explore a solution that will work best within your company.

Tips For Creating Secure Passwords

Although password managers may be convenient users should recognize that they should still use the program responsibly and set up secure passwords that are not easy to guess. Passwords should never simply be a single word. The most secure passwords use a combination of alpha-numeric characters – with caps and special characters to boot.

Hacker’s have software like keyloggers or password generators that can detect common keystrokes on a network in order to steal your passwords. In order to make it harder for keystrokes to detect passwords different passwords should be used for every single account. That way if one account is breached it will not put all your accounts at risk.

Although choosing several different passwords makes management harder to remember, your password management software will save all these keyphrases for you and your employees. In addition to storing multiple passwords the software will also encrypt the data for you so that it is not easy for outsiders to retrieve. When an employee needs a password to access an account they can do so using a special thumbdrive application, browser application, or smart card application as mentioned before.

Source from :http://blog.rivalhost.com/business-password-management-tips/