Subscribe in a reader

Since 'the geek shall inherit the earth', this geek is just waiting for his day to rule the world. In the meantime, he is a young Padawan for CNET Asia whilst toying with a myriad of fun stuff disguised as work and pretending to advise companies on tech business and new media strategies. His playmates range from startups, (un)Fortune 500s, to government organisations.
Subscribe to Geekonomics by Email

CONTACT Geekonomics

Now in this geek's bag:

. iPhone 4 32GB
. Kindle Graphite
. Canon Legria HFM32
. Samsung Galaxy Tab
. Algo Tablet
. LG Optimus 7
. Nokia N8
. Sony VAIO VGN-P23G
. Blackberry Bold 9780
. Lenovo Thinkpad W700ds a.k.a. "Chewie"
. Canon PowerShot G11
. Lenovo S10-2
. Jawbone 3rd Gen Bluetooth Headset with Noise Assassin
. Ultimate Ears Triple.fi Pro

Formerly in this bag:
. Lenovo Ideapad U260
. Blackberry Bold 9700
. Nokia N900
. iPhone 3GS 16GB
. Sony Ericsson Xperia X10 mini pro
. HTC Snap
. Plantronics Discovery 975 headset
. Acer beTouch E100
. Zune HD
. Nokia N97 Mini
. HP Probook
. Apple iPod Touch 2nd Gen with Ultimate Ears super.fi
. Nokia BH-902 Bluetooth Headset
. Blackberry 8800
. Nokia N96
. Blackberry Bold 9000
. LG WM6.5 Prototype
. Jawbone 2nd Gen Bluetooth Headset with Noise Assassin
. HTC Touch Cruise
. Lenovo Thinkpad T400s
. Canon Powershot G10
. Lenovo IdeaPad U350
. Canon Digital IXUS 990 IS
. Samsung Galaxy
. Canon Legria FS200
. Canon SX10 IS
. Blackberry Curve 8320
. Canon EOS 5D Mark II
. Canon Digital IXUS 980 IS
. Gigabyte Netbook M912V Tablet
. Lenovo Ideapad S10
. Lenovo Thinkpad X200
. Samsung Innov8
. Samsung Omnia
. Apple iPhone 3G
. Apple iPod Shuffle
. Kohjinsha SX Series
. Kohijnsha SC Series
. Canon Powershot S5 IS
. Canon EOS 1000D
  • 08Jun

    Today is World IPV6 Day with a number of organisations starting to offer Internet services using the replacement Internet Protocol version 6 (IPv6) standard, that contains a number of improvements over the legacy IPv4. A key benefit is a huge increase in possible address space.

    From a security perspective, Symantec feels this move raises some new and potentially interesting problems for malware authors, anti-virus companies and system/network administrators. With the introduction of IPv6, it is now unlikely for cyber criminals to perform brute force IPv6 address scans to profile a network or identify a possible attack vector in this way.

    Events like World IPv6 Day are important steps towards a full adoption of the replacement protocol. But as we move towards this goal, we are facing a learning curve where new threats while not yet fully apparent, will gradually emerge as malware authors are certain to take note and begin adapting.

    As always, Symantec recommends that you keep your definitions, signatures and firewall rules up to date to ensure protection against threats.

    Read more about this brave new world of IPv6 at Symantec’s security blog

    Share/Save/Bookmark

  • 08Dec

     

    Well looks like Symantec does it again. 3rd and 4th year consecutive wins are pretty impressive results, if you ask me.

    SINGAPORE – December 8, 2010 – Symantec Corp. (Nasdaq: SYMC) today announced that Symantec Endpoint Protection 11.0 and its VeriSign Identity Protection Authentication Service have won the 2010 NetworkWorld Asia Readers’ Choice Product Excellence Awards for Best Anti-Spyware/ Malware and Best Identity Management Suite categories respectively. This is Symantec’s fourth consecutive win for Symantec Endpoint Protection and its third consecutive win for the VeriSign Identity Protection Authentication Service.

    Read more…

    Share/Save/Bookmark

  • 18Nov

    Facebook_Privacy[1] Facebook has announced its new email service which brings together Facebook messages, instant messaging chat and SMS messages in one place.

    This geek was alerted to some of the security implications through an FAQ guide which Sophos has setup.

    "Before signing up, users need to realise that these new features increase the attack surface on the Facebook platform, and make personal accounts all the more alluring for cybercriminals to break into," said Graham Cluley, senior technology consultant at Sophos. More from Sophos after the break.

    Read more…

    Share/Save/Bookmark

  • 08Oct

    Sounds like something straight out of a spy movie? In this day and age, you never know especially after Google claimed that the Chinese government orchestrated an attack on their services just early this year. Read the full release from Symantec for yourself and be your own judge:

    SINGAPORE, October 7, 2010 – Symantec Corp. (Nasdaq: SYMC) has released the findings of its 2010 Critical Information Infrastructure Protection (CIP) Survey, which highlights that 53 percent of critical infrastructure providers report that their networks have experienced what they perceived as politically motivated cyber attacks.  Participants claimed to have experienced such an attack on an average of 10 times in the past five years, incurring an average cost of $850,000 to their businesses.  Survey participants from the energy industry reported that they were best prepared for such an attack, while participants from the communications industry reported that they were the least prepared.  Critical infrastructure providers represent industries that are of such importance either to a nation’s economy or society that if their cyber networks were successfully attacked and damaged, the result would threaten national security.

    Read more…

    Share/Save/Bookmark

  • 10Sep

    Norton Cybercrime Report is the First Study to Gauge Emotional Impact of Cybercrime on Internet Users and reports of victims feeling very ripped off and upset.

    Singapore – September 9, 2010 – The next time you surf the Internet, consider this: you might just be one click away from becoming the next cybercrime victim. A new study released today from security software maker Norton, reveals the prevalence of cybercrime in Singapore where 70 percent of Internet users have fallen victim to cybercrimes, including computer viruses, online credit card fraud and identity theft. This silent digital epidemic is the result of consumers‟ apathy, which leaves them vulnerable and exposed in the online world.

    The Norton Cybercrime Report: The Human Impact

    Read more…

    Share/Save/Bookmark

  • 10Sep

    Club Penguin arrived in Singapore this week. This geek has always heard about Club Penguin making millions of dollars getting kids to dress up Penguins but never understood the reason behind their wild success until now. While I’m working on a story on my CNET Blog now, you can read the full press release after the break.

    club-penguin

    Singapore: 8th September 2010:

    Read more…

    Share/Save/Bookmark

  • 03Aug

    When 2009 came to a close, Symantec made a few predictions regarding what online security trends that were expected in 2010. They have just released this mid-year status check, pretty interesting. Check it out:

    Prediction #1

    Antivirus is Not Enough – With the rise of polymorphic threats and the explosion of unique malware variants in 2009, the industry is quickly realizing that traditional approaches to antivirus, both file signatures and heuristic/behavioral capabilities, are not enough to protect against today’s threats. We have reached an inflection point where new malicious programs are created at a higher rate than good programs. As such, we have also reached a point where it no longer makes sense to focus solely on analyzing malware. Instead, approaches to security that look to ways to include all software files, such as Reputation-Based Security, will become key in 2010.

    Status: On track

    Reasoning:

    Read more…

    Share/Save/Bookmark

  • 14Jul

     

    This appeared in my inbox yesterday:

    Dear,
                      ”PLEASE THIS LETTER MUST REMAIN SECRET”   
    I  am Olarn Chaipravat,  former deputy prime minister during Thaksin Shinawatra regime which was ousted  by a military coup on Sept 19 2006,and  Martial law was imposed by the Council for Democratic Reform, now called the Council for National Security . After the Sept 19 coup, i would have called you on phone , but because  the new government is  taping   the past goverment  officials phone numbers, so it is  no longer safe for me to call you, that is why i think it is safe to send you this mail. we are placed under surveillance.
    However my main point of contacting you is to seek your sincere suggestion and guideline to invest in your country. And please because of my previous position in the government, i do not need to tell you of the absolute confidentiality  which we both must have to observe, if we are to go into investment, or rather if you are to help me in investing in your country.
    I  desided  to  contact  you  now  that  I  am  very  sure  that  all  eyes  are  not  on  us as  it  was  when  the  problem  first  began  though  we  are  still  going  to  court  but  the  environment  is  good  now  to  handle  the  transaction  very  safely.
    From the news publications attached here in respect of the goverment probes into much of the projects my ministry executed will make you to understand my position  with the govenment now.
    I  thank you very much for taking time to go through my mail, and hope to read from your reply soon, .Thanks for your anticipated co-operation and my
    regards to your family.
    Good luck,and feel free to contact me on my email for now, until arrangements are made.
    yours sincerely,
    OLARN CHAIPRAVAT.
    Please reply me for further details to (email removed by this geek)

    I attach herewith my international passport. (picture after the break)

    Read more…

    Share/Save/Bookmark

  • 09Jun

    This is interesting. First of all, to have boot camps sprout out all over China for “internet addicts”. I’ve seen TV reports of these addicts given jabs daily but nobody knows what is contained in the jabs. And now this mutiny. Makes me wonder if these boot camps will ever open in countries like Singapore and Korea?

    Share/Save/Bookmark

  • 11May

    Search engine results poisoned with links to fake antivirus software have been a constant problem for Internet users. However, it is an effective way for cyber attackers to infect users’ machines. Google recently presented a research paper regarding websites that offer fake antivirus software and part of Google’s research shows that search engine results can lead to such pages. The presentation demonstrates that Google is working hard at preventing these search poisoning attempts.

    According to Symantec’s Report on Rogue Security Software, the culprits of these “toxic” search results are typically scam perpetrators who use

    Read more…

    Share/Save/Bookmark

« Previous Entries