<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d89248328178292746\x26blogName\x3dE-DUMDUM+is+here!!\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLACK\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://e-dumdum.blogspot.com/search\x26blogLocale\x3den\x26v\x3d2\x26homepageUrl\x3dhttp://e-dumdum.blogspot.com/\x26vt\x3d7513571123737689601', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe", messageHandlersFilter: gapi.iframes.CROSS_ORIGIN_IFRAMES_FILTER, messageHandlers: { 'blogger-ping': function() {} } }); } }); </script>
Dashboard

Saturday, June 21, 2008 . 10:36:00 PM

How to safeguard our personal and financial data??
As the e-commerce is rapidly evolving now, most of the transactions can be settled or deal by using Internet. It is very convenient and less time consuming. Although Internet brings a lot of benefits to the users, it is still high risk in security, especially the transactions that relate to financial issue. The users scare that their personal or financial data will be exposed and misused by 3rd party. It is not as secure as doing the matter manually or face to face. This is the main reason why people do not like or avoid to use Internet to settle payment and purchase goods or services.

In order to decrease the risk of security and use the website more safety, there are six ways to safe online transactions. Firstly, install a firewall. A firewall is a software program designed to allow good people in and keep bad people out. Most new computers come with firewalls integrated into their operating systems. Those who have a DSL or cable modem have an added layer of protection because these modems come with yet another firewall built in. If, however, you have an older computer or use dial up, you may need to buy a firewall separately and install it yourself.

Secondly, install and update anti-spyware and antivirus programs. Microsoft and numerous application vendors offer users regular updates to existing anti-spyware programs, so be on the lookout. As for antivirus protection, Symantec and Norton antivirus are popular choices. If you're looking to cut costs, Consumer Reports says Alwil Avast offers the best free virus protection available.

Thirdly, avoid accessing financial information in public. Resist logging on to check your bank balance when working from a coffee shop that offers wireless access. These systems are convenient, but also unknown. Casual users have no way of assessing how strong their firewalls are.

Fourthly, always update your browser. Updating your browser on a regular basis can help plug up security holes, so make it a habit. Besides that, it is better to use secure browsers that supported by Secure Sockets Layer (SSL). For example, Microsoft Internet Explorer and Mozilla Firefox.

Fifthly, look for "locks”. How can you tell if your financial site is really secure before you log on? The Web address should start with "https" instead of "http". Besides that, also look for small lock icon in the lower-right corner of the browser window.

Lastly, do not open mystery attachments. Never open an attachment or click on a link sent to you by an unknown party. Attachments can contain viruses and links can lead unsuspecting users to dummy sites where they are asked to input financial information. In addition, there are few secure symbols to look for when browsing a particular website. For example, webtrust and verisign secure site.

posted by: Lay


The threat of online security: How safe is our data?
Being a web user, it is very important for us to learn about the online security threats. In year 2008, online security threats loomed dramatically. Web-based services, including social networks MySpace and Facebook, are becoming prime targets for hackers to seek personal information.

Risk of identity theft may be caused by cases of stolen laptops or systems hacking which contain personal particulars of some organisations' employees. Stolen laptops might contain personal data with their financial information like bank account details, which will potentially lead to abuse of data or being used to apply loans or credit cards under false names.

As Internet users display more of their personal information on social networking Web sites, and office workers upload more sensitive data to online software programs, computer hackers are employing increasingly sophisticated methods to pry that information loose. In many cases, they're devising small attacks that can fly under the radar of traditional security software, while exploiting the trust users place in popular business and consumer Web sites.


In September, tens of thousands of customers' names and contact information of Automatic Data Processing (ADP) and SunTrust Banks (STI) were stolen from Salesforce.com, which provides online customer management software for those two companies. The incident occurred after a hacker tricked a Salesforce employee into disclosing a password.

The assaults on consumer sites are getting more unnerving as well. A security researcher reported Nov. 8 that hackers had hijacked pages on News Corporation's social networking site MySpace, including the home page of singer Alicia Keys. Clicking nearly anywhere on the page would lead viewers to a Web site in China that tries to trick them into downloading software that can take over their PCs.

Besides that, social networks, Internet calling system, and smart phones could be more vulnerable to hackers in year 2008. Innovative software, Web sites, and devices attract attention because they make communicating easier, accomplishing tasks faster, or being online more entertaining. But hackers generally follow to exploit the latest mass market.

With all these online security threats, people may wonder how safe is their personal data. Occasionally, I did received a message saying that I have won a first prize in some kind of competition and asked me to send them my bank account number, so that they can transfer the money to my account. The problem here is I never participate in any competition, how can I win something? And how do they get my phone number and my identity card number? To avoid these situations, we should pay more attention to the safety of our private information and avoid sending out our personal information to the stranger.
posted by: Jwens



Phishing: Examples and its prevention methods

Phishing is an attempt to criminally obtain sensitive information of the others. These information include usernames, passwords and credit card details. Phishing is done by the mastermind impersonating a trustworthy entity in an electronic communication. An e-mail is sent to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering sensitive information that will be used for identity theft. Usually a link is included in this e-mail for the victims to click. The link in the e-mail directs the user to visit a web site that is professionally developed to look exactly the same as the website they claim to be from where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. PayPal is one of the many examples that phishers has tried to impersonate. PayPal was spelled wrongly in this phishing attempt in the e-mail and the presence of an IP address in the link are both clues that this is a phishing attempt. Another giveaway is the lack of a personal greeting, although the presence of personal details would not be a guarantee of legitimacy. Other signs that the message is a fraud are misspellings of simple words and the threat of consequences such as account suspension if the recipient fails to comply with the message's requests.

In Malaysia, banks are among the most popular target of phishers. Maybank2u.com.my is one of them. The phishers deceive the user with the purpose of stealing their login data and PIN number. Cross-site scripting and Trojan horses can also be used to steal such information.

There are several different methods and techniques to avoid being phished. The Golden rule is to never ever click the website links within the text of the e-mail. Typing the link on your web browser is always preferable. Delete such e-mails immediately as they may be infected with virus as well. Once you have deleted the e-mail then empty the trash box in your e-mail client as well to prevent "accidental" clicks. The alternative way is train people to recognize phishing attempts. Users should not trust any hyperlinks in suspected phishing messages.

Since phishing is based on impersonation, preventing it depends on some reliable methods to determine a website's real identity. For example, some anti-phishing toolbars display the domain name for the visited website. The “Petname” extension for Mozilla Firefox and Microsoft Internet Explorer lets users type in their own labels for websites, so they can later recognize when they have returned to the site. If the site is suspected, then the software may either warn the user or block the site immediately.
The screenshots below shows phishers attempts at phishing

posted by: Lai Mun


Sunday, June 15, 2008 . 5:32:00 PM

An Example of An E-Commerce Failure and Its Causes

This few years e-commerce becomes very popular and broad in the world. Most of the transaction between suppliers and buyers is deal through e-commerce. Electronic commerce, commonly known as e-commerce, consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. I even will use e-commerce to make some transactions rather than approach to the outlet because it is more convenient and save time. I just need to click on the keyboard then can get what I want. I think this is the reason why e-commerce is useful.

However, there is failure on e-commerce also. When you set up an e-marketplace in the Internet to sell your products, you have to promote or advertise the website to make it well-known among the Internet users. Sometimes it may not easy to do or achieve. When you are successful, it can boost up your sales. Besides that, the income that had yield must be enough to cover all the cost like advertising and marketing. An example of this situation is eToys.com which established only four years then closed down in year 2001. eToys.com spent millions on advertising, marketing, and technology and battled a host of competitors. And like many of its failed brethren, all that spending outweighed the company's income, and investors quickly jumped ship. This caused the share price decreased from a high of $84 per share in year 1999 to a low of just 9 cents per share in year 2001.

I can see that, to make a website or e-marketplace to be well-known is not easy. The master of the website must be able to make profit which cost of maintaining the site no more than the income received. If not, what is the purpose of running an e-market?

posted by: Lay


E-commerce: Reduction of cycle time, improvement in employees' empowerment and facilitating better customer services
In the globalize business environment, a business need to maintain its competitive edge in order to be successful. With the advancement of technologies, an organization can boost up its profit easily by applying E-commerce.

E-commerce is a system that allows an organization to communicate with its business partners, such as suppliers and customers by the use of electronic devices. With the use of electronic devices, it helps the organization to cut down the business cycle time. Cycle time refers to the length between a customer placing an order and the goods being sent to customer. For instance, when the customer made an order through the company’s webpage, the order will automatically registered into the company’s database, and sent the purchase order to related departments simultaneously. Similarly, when the stock has reached reorder level, Electronic Data Interchange (EDI) system will automatically send an E-mail to the supplier to make the necessary orders.

Sharing: E-Procurement can reduce cycle time up to 50%!!!

Besides that, E-commerce also helps the organization to facilitate better empowerment to employees. With the front end system, no employee is needed to interact with the customer while the customer is making order. While the employees are empowered to work on back end activities such as inventory management, accounting and finance, payment processing, delivery, etc. By doing this, an organization can have only little employees to run a business, while employees’ morale can be increased by empowerment.


The key factor for a business to be successful is the ability to retain its customers. E-commerce able to provide a few “24/7” customer supports, such as user friendly “step-by-step” guidance, frequently asked questions, search engines, etc. Besides that, the online system includes customer service center, which specifically solve customers’ queries and deal with customers’ complaints. Feedbacks from customers are very important because it helps the company to identify the weaknesses, as well as the customers’ needs.

Sharing: It costs ten times more to generate a new customer than to maintain an existing one!!!

E-commerce assists an organization to maintain its competitiveness by reducing cycle time, improving employees’ empowerment, and facilitate better customer supports. Therefore, it is considerable to implement E-commerce in the business as benefits are greater than costs.
posted by: Niew (aka Windward)