Wednesday, June 11, 2008
Review on My E-Commerce blog (week 4)
We should be proud that our Malaysian government has spend an amount of RM43 million to set up an International Multinational Partnership against Cyber terrorism. This centre offers the world best brain and facilities to help fight cyber security threat by eliminating viruses that roaming in the internet in our country.
On the other hand, Spamming is also one of the internet threats where its function is flooding of electronic mail systems with “junk e-mail”. Also known as unsolicited bulk messages sent through the electronic messaging systems. There are various types of spam such as PDF Spam, Piggyback Spam, and Greeting Card Spam where each of them pays a different role of their own.
Downloading movies or even mp3 in the internet may cause a threat because you may invite unwanted hackers hack into your computers. For example, one of the military pentagons was hacked and taken of 1500 emails account offline. After the incident, the US military band using e-mail anymore. Not only PC, mobile phone also is a victim Malware or known as mobile malicious software that act like a virus attack in your mobile phone.
In conclusion, we should use the internet wisely in order to prevent virus attack. Install a reliable anti virus software.
Safeguarding your Personal and Financial Data (week4)
Phishing. Example and Prevention (week 4)
Many have been solicited by fake eBay and Citibank requests for additional personal information. Research has found that there are occasional an e-mail from eBay advising user to update their account. There is a click button of right-click and View Source on the e-mail send and whenever you click it will link you to the other destination rather than eBay sites. This is one of the techniques that use by the phisher to hope that they will lure users with the threat of their account being closed or worse, hoping that they will provide their personal information.
There are several ways to prevent phishing which is through education. Gain additional knowledge on how to suspect corporate e-mail, even if it comes from a reliable authority. For example a company can hire security experts to spear-phish their own organization by looking for weak links and educating employees. Companies also can stop sending out links within IT, HR, and accounting-related e-mail rather than refer employees to an intranet, password-protected home page. Companies should also use secure Web forms rather than e-mail to transact personal information such as social security numbers and the like.
http://www.cnet.com/
Threat of Online Security (week 4)
In order to make sure our data is safe, Zone Labs has released ZoneAlarm Pro 6.5 and ZoneAlarm Internet Security Suite 6.5, the first security software apps I know of to offer real-world identity protection, monitoring, and recovery. By partnering with an identity management company, Intersections, Zone Labs is making the promise that it will educate you, provide you the services you need to stay safe online and off, and should someone steal your identity, the team will be there to help you recover with personal assistance. Had you purchased similar services from an identity management service directly, you could easily double the purchase price of ZoneAlarm Internet Security. But for ZoneAlarm Pro and Internet Security Suite customers, the monitoring is free.
http://www.zonealarm.com/