Friday, February 20, 2009

Corporate Blogging: A New Marketing Communication Tool for Companies

A corporate blog is a weblog that published and used by an organization to reach its organizational goals. It is a very strong communication and information sharing tools in a corporate community. Today, corporate blogging is widely used and published by an organization to achieve its organizational goals.
a
In addition, corporate blog can be divided into 3 categories, which are:
(a) Internal Blogs – a weblog that every employee can view and comment.
(b) External Blogs - a publicly available weblog where company employees, teams, or spokespersons share their views.
(c) CEO Blogs – a weblog that run by CEO only.
a
Furthermore, there is some benefits than can gain by organisation in using corporate blogging as a marketing communication tools.
*Customer Relationship and Feedback*
Corporate blogging can helps in introducing new products to customer and also get immediate feedback from them. This will obviously help to accelerate customer relationship.
*Corporate Imaging and Branding*
Corporate blogs, both through their content and potential visibility in search engines, improve overall brand awareness amongst a companies targeted customer base.
*New Product and Service Testing*
Such a two-way channel of communication allows for immediate feedback from your customer base on new market ideas and products/services in their fledgling phases.
a
a
a
In long term, corporate blogging will become a form of advertisement to customer as organisations will keep on using this corporate blog to communicate with customer and promoting new products. Therefore, a successful marketing through blogs should create or enters an area of interest where the readers are known the products or services.
a
Finally, the corporate blogging should be consider as a successful communication tool because it helps company in public speaking, build trustworthiness among customer and boost up their company’s credentials.
a
a
a
a

Thursday, February 19, 2009

Things to take note to prevent e-auction fraud when a consumer participating in an e-auction

E-auction can be defined as a market mechanism by which sellers place offers and buyers make bids which conducted online and is characterized by the competitive and dynamic nature by which the final product is reached. However, there is also limitation of e-auctions and one of them is that it faces the possibility of fraud. Furthermore, e-auction fraud is growing epidemic worldwide, as online shopping has grown significantly every year that online shopping has been available.

The following are few types of e-auction fraud:

a

Bid shielding

Phantom bidders bid at a very high price when an auction begins; they pull out at the last minute, and the bidder who bid a much lower price wins.

Shilling

Placing fake bids on auction items to artificially jack up the bidding price, in this way, sellers get more benefits.

Hidden shipping costs and handling fee

Sellers hide the real shipping cost and handling fee. By the time buyers get the product, they might need to pay more than they expected.

Failure to deliver

Some times buyer will never get the product even after he/she paid for it.

a

And now I would like to share some tips to prevent e-auction fraud. The largest Internet auctioneer, eBay, has introduced several measures in an effort to reduce fraud:

a

aaaUser identity verification

A voluntary program that verify users by offering their Social Security number, driver’s license number and date of birth, users can qualify for the highest level of verification on the sites. In order that, encourages users to supply the sites with information for online verification.

a

Authentication service

It is a way of determining whether an item is genuine and described appropriately. Authentication is very difficult to perform because their training and experience, experts can often detect counterfeits based on subtle details.

a

Grading services

It determined the physical condition of an item, such as “poor quality” or “mint condition.” Different items have different grading system, for example trading cards are graded from A1 to F1, whereas coins are graded from poor to perfect uncirculated.

a

a

a

a

Feedback Forum

The Feedback Forum allows registered buyers and sellers to build up their online trading reputations. It provides users with the ability to comment on their experiences with other individuals.

a

Insurance policy

For example, eBay offers insurance underwritten by Lloyd’s of London. Users are covered up to $200, with a $25 deductible. The program is provided at no cost to eBay users.

a

Escrow services

Both buyers and sellers in deal are protected with an easy-to-access link to third party escrow service. The buyer mails the payment to the escrow service, which verifies the payment and alerts the seller when everything checks out. An example of a provider of online escrow services is tradenable.com.

a

Nonpayment punishment

To help protect sellers, first-time nonpayment results in a friendly warning. A sterner warning is issued for a second-time offense, a 30-day suspension for a third offense, and indefinite suspension for a fourth offense.

a

Appraisal services

Appraisers use a variety of methods to appraise items, including expert assessment of authenticity and condition and reviewing what comparable items have sold for in the marketplace in recent months.

a

Verification

It is a way of confirming the identity and evaluating the condition of an item. With verification, neutral third parties will evaluate and identify an item through a variety of means. For example, some collectors have their item “DNA tagged” for identification purposes. This provides a way of tracking an item if it changes ownership in the future.

a

There are some tips on keeping your risk at a minimum when purchasing items from an online auction website.

a

· Become familiar with the auction website

· Before placing a bid, learn as much as you can about the seller.

· If the seller wants you to use an escrow service you’ve never heard of, look into it.

· Never ever give out your social security number, driver’s license number, credit card number, or bank account information until you have thoroughly checked out the seller and the escrow service.

· Always save 100% of the transaction information.

a

a

a

http://www.ecommerce-journal.com/articles/beware_of_e_auctions

http://wps.prenhall.com/wps/media/objects/260/267260/online_appendices/Turban-Appendix2A.pdf

Wednesday, February 18, 2009

E-Government in Malaysia: Its implementation so far and ciizen's adoption strategies

The Electronic Government initiative was launched to lead the country into the Information Age. It will improve how the government operates internally, as well as how it delivers services to the people of Malaysia. It seeks to improve the convenience, accessibility and quality of interactions with citizens and businesses. At the same time, it will improve information flows and processes within government to improve the speed and quality of policy development as well as the coordination and enforcement.
a
a
E-government is one of the seven flagship applications introduced in Multimedia Super Corridor (MSC). The objectives of these flagship applications are engineered to start the MSC initiative and create a multimedia heaven for innovative producers and users of multimedia technology.The Flagship Applications are Electronic Government, Multipurpose Card, Smart School, Telehealth, R&D Clusters, E-Business, Technopreneur Development.
a
a
The implementation status of e-government project in Malaysia:
a
1. Electronic Procurement (eP) Project a a
2. Project Monitoring System (PMS II) a a
3. Electronic Services Directory (eServices) a a
4. Human Resource Management Information System (HRMIS)
5. Generic Office Environment (GOE) a a
6. Electronic Labour Exchange (ELX) a a
7. E-Syariah
a
a
Malaysian e-government successful applications:
a
-Government’s drive for e-government services a
a
-Electronic Labour Exchange (http://www.elx.gov.my/) a
a
-SMS alert on e-government services a a
a
-Online renewal of driving licenses
a
-Electronic filing of income tax forms a
a
-Voter information a
a
-Details for government tenders a a
a
-Employment opportunities a
a
a
Common problem encounter by Citizen’s is some of them have the lowest levels of access by digital divide because not all citizens know how to use online access. Secondly , development of technology is moving very fast, so it is very difficult for Citizens to foresee future impact in detail. There is Ways to encouraged citizens to use the government application by building the foundation of facts based on information from its citizens. As we know citizens expect and demand governmental services with a high degree of quality, quantity, and availability in a 24-hour, seven-days-a-week, and year-round. Governments all over the world are developing information systems and electronic services that have the capacity to meet these emerging service needs and demands of citizens and other clients. The government must also concern about information quality and system quality. Besides that, efficiency, accuracy, relevancy and completeness are also important and were more significant than timeliness and precision.
a
a
Malaysia now has to improve the core government application and integrating more service across agencies.
a
a

Tuesday, February 17, 2009

Review on Local E-Commerce Site ~*Blooming.com.my*~

Blooming.com.my is a local e-commerce site that selling flower and other small gifts such as cards bears, gourmet baskets and etc. They provide up to 100 pieces photos of hand bouquets. I’m sure that you could find you ideal bouquets in this site.
a
Similar to other e-commerce site, Blooming.com.my provide member registration and log in, shopping cart, search engine and so on. However, they provide some services that only members are able to read through, such as order tracking, gift reminder, address book and online payment.
a
a a
a
I get attracted to this website because I have found out that this Blomming.com.my not only provides delivery services to Selangor (where their physical store is located), but to all major towns area, including Sabah and Sarawak (but there is extra charge on some area). Furthermore, they do accept online credit card payments, online banking and mobile payment.
a
a
a
a
a
Screenshot of Blooming.com.my check out page
a
For consumer purpose, Blooming.com.my has provided order tracking service where u can trace your order on the delivery status. In addition, live support is also provided so that customer could make enquiries on the spot, no need to waste money to make a call. There is a “Tips corner” that teaching customer on selecting and arrangement of flowers.
a
In conclusion, although all the features in Blooming.com.my are simple (not much special), but it is enough for a basic internet user to deal with e-commerce. Basic internet user would not need too much or complicated steps in ordering and searching in the website. Nevertheless, in my opinion, Blooming.com.my have to improve in their hand bouquets and also others product’s picture. Indeed, they are providing good services but the photos are not really attracting people. After changing this, I think there would be more visitor and customer to view through Blooming.com.my.
a
a
a
a

Monday, February 16, 2009

A review on *Legal* from My E-Commerce blog -*Cyber Success*-

Malaysian government announced that there will be some new guidelines to be enforced soon on Internet and cyber cafes.
a
Cyber cafe normally attracts kids and children to play games. Thus, there are guidelines to be enforced to protect new the youth is to restrict minors under the age of 18 entering internet cafes. Such as those under 12 years old must be accompanied by parents or guardian and only allowed to stay up to 10.00pm. However, only the government regulation is not enough to prohibit all youth enter into cyber cafe those under 12 yrs old. The parent is play the important role to prohibit the youth enter the cyber cafe.
a
Another guideline is enforced to protect to the youth from the influence of internet cafes. However, only the government check is not enough to block all prohibited sites from users. Compulsory installation of protective software can be one of the considerations to strengthen the initiatives.
a
The government announced the internet and cyber cafe is prohibited from providing gaming activities, gambling, pornography, music and publications with negative element, besides that the cigarettes and alcohol to be prohibited from being sold in the cyber cafe. This guideline is enforced to prevent the Internet and cyber cafes from turning into the social ills, and can reduce the social ills.
a
Illegal internet cafes should be punished such as legal internet cafes that fail to meet important guideline will have their licenses revoked. The legal duties are only claimed on operators or customers. It would be more effective if the responsibilities are imposed on staff. The business of internet and cyber cafe still can survive if provide some promotion and explain to customer in respect of these guidelines.
a
a
a

Friday, February 13, 2009

Review on a post on E-Tailiing from My E-Commerce blog -* Touch n Go*-

Touch n Go card is well known as a pre-load cash card which is mainly use for transportation and toll collection purpose. Recently, Touch n Go Sdn Bhd (TNGSB) has been introduced in both KL International Airport (KLIA) and Low-Cost Carrier Terminal (LCCT) since February 2008.
a
According to TNGSB’s managing director Datuk Yahya Yaacob, TNGSB is planning to have 16 new sites in the Klang Valley and also planning to expand this facility to Johor Baru and Penang.
a
Surprisingly, start from 19th April 2008, consumer are able to buy fast food or even shopping in some hypermarket by using Touch n’ Go card. The outlets are from A&W, Burger King, Dunkin’ Donut, 7-Eleven, Carrefour hypermarkets, Caltex convenience stores and Cineleisure.
a
a
a
Consumer no need to worry about extra charge in using TNG card as all the chain stores have an agreement that there will be no extra charges for those using Touch ’n Go cards compared to those using cash.
a
a
a
Furthermore, TNG user would not have to worry about card lost or stolen problem. Same as other credit card and ATM card, user just need to inform TNGSB immediately and they will block the card.
a
a
a
a
a
a
a
a
a
TNGSB hope that by next year, 5% to 10% of the cardholders will use it for retail purchase, emulating the success of Octopus card, which is a transit electronic purse in Hong Kong that is one of the most successful in the world, only has 20% of the holders use it for retail purchase.
a
In my opinion, TNG card has been move forward to fast food industry. However, this facility only available in Klang Valley, which means most of people, especially those not around Klang Valley, has no chance to really participate in the usage. This will lead to lower usage in current and also future. I suggest that they should try to speed up in expanding this facility as what they have planned. So this will give benefits to everyone including TNGSB by increasing the usage of TNB card in retail purchase.
a
a
a

Thursday, February 12, 2009

Credit Card debts: Causes and Preventions

Credit cards, when used properly, are convenient and a great budgeting tool. If abused, though, credit cards can be the start of a years-long nightmare and unbelievable stress. However, nowadays it seems that credit cards are almost a necessity, rather than a luxury, which has caused many people to have a huge problem with credit card debt. Generally, everyone would have more than one credit card on hand and it has been found that there are many people who have been relying on their credit cards too much and are now in debt.
a
a
a
a
a
a
a
a
A credit card is exactly what the name implies which is a card with which you are able to use by borrowing on credit. Every time you use a credit card, you are borrowing money from the credit card issuer. Also, each time you use your credit card, you are increasing your credit card debt. The major factor is users will be charged interest on the balance owed when making only the minimum payment due. Therefore, users are just paying interest on the previous month's balance as well.
a
Poor money management skills also one of the factors that causes credit card debts. A sudden reduction of income will cause people fall up to the ears into credit card debts. For example, people kept on spending as much as they got used to regardless of the reduced income.
a
Furthermore, there are too many people who cannot possibly find equilibrium between their expenses and their income. With prices of goods and services are going up but not the income, hence people are forced to spend beyond their earnings. At that time, they will use credit card to purchase the goods and services and unable to payback the expenses.
a
a
a
a
a
a
a
a
a
When it comes to credit card debt, prevention really is better than cure. First, avoid interest charged and stay out of debt. Every credit card offers interest-free period, thus settle the payment before the period ends. If you can afford it, pay doubles the minimum payment. The minimum payment usually pays just enough to cover the interest and a little more that pays down the balance. Paying extra will pay your balance more quickly.
a
Instead of a bunch of credit cards, it's recommended to only own one or two low interest ones. The lesser card you are holding, the lesser probability for debts. Besides, you are also recommended to use debit card or paying in cash, both of which only use what you have as opposed to adding to your debt.
a
Finally, credit card users should establish good credit card spending habits. A credit card should be a convenient means of spending money that you have readily available. It is not a free pass to spend money that you don’t have or will be borrowing. Thus, the users are advised to keep a budget and know what you have available to cover expenditures.
a
As a conclusion, only use credit card for major purchases or emergencies. If you do not have money available in liquid assets to cover the purchase, do not use the card. If you can get into good credit card habits early on and stick with them, you will avoid having to dig yourself out of credit card debt.
a
a

Wednesday, February 11, 2009

The application of pre-paid cash card for consumers

Pre-paid cash card work as a reloadable debit card allows you to only spend up to the amount you have pre-deposited into the account. As purchases are made, funds are immediately deducted from the available card balance. If you tend to control you’re spending then a pre-paid cash card or prepaid credit card could be a good card for you. Thrust me, it is a new way to managing your money. A pre-paid cash card is safer if comparing to carrying cash because cash card can prevent cash being stolen or lost.
a
a
Pre-paid cash cards may be convenient for the card holder; the real benefit belongs to the card issuer. Because the cards are pre-paid, the issuer gets immediate use of all the money that was used to fund the card, even if the cardholder takes months to spend it all. So, now many consumers choose to apply a pre-paid cash card because it is safe and easy.
a
a
a
Example of pre-paid cash card
a
a
The Touch 'n Go smart card is used by Malaysian toll expressway and highway operators as the sole electronic payment system (EPS) which uses contactless smartcard technology. The card looks similar to a credit card. Touch’n Go card not only for toll fare but also parking services, public transport , theme park and cashless payment at retail outlets . User can continue using the card as long as it is pre-loaded with electronic cash. . once user finish with their money they can reload their card at toll plaza , train stations, petronas kedai mesra, kiosk, mini mart ,mobile phone shops , auto teller machines . The card may be reloaded from 10 denominations between RM10 to RM500.

a

a

You can use Touch ’n Go card to buy burgers. Have u heard of it?

a a

a

Yes , you can . The next time you go to a fast-food stall for your burger or doughnut, don’t worry if you have forgotten your money as all you need is your Touch ’n Go card. You can buy such items from 21 outlets in the Klang Valley under a pilot scheme for the Touch ‘n Go card which is currently a toll, public transport and parking paying device. The outlets are from A&W, Burger King, Dunkin’ Donut, 7-Eleven, Carrefour hypermarkets, Caltex convenience stores and Cineleisure. The card could also be a good way of controlling children's spending as this could be their one card from taking public transport to buying their lunch or snacks.
a
a
Touch‘n Go enhances the speed of paying for low value but high frequency transactions. Apart from the speed, it is also very convenient because user no longer need to prepare for small change or wait in queue at the cash lane to complete the transaction. Touch 'n Go Sdn Bhd (formerly known as Rangkaian Segar Sdn Bhd), the operator of this Electronic Payment System, has several range of Touch ‘n Go cards to suit different market needs too.
a

Tuesday, February 10, 2009

Mobile Payment System in Malaysia : Its Potential and Consumer Adoption Strategies

Mobile payment is also referred to as mobile web payment or WAP billing and it is the collection of money from a consumer via a mobile device.
a
One of the mobile payment system in Malaysia, Mobile Money, is guided by Mobile Money International Sdn Bhd. Mobile Money provides any handphone users the convenience to pay anyone, on any time, at anywhere. This system is a PIN-based Mobile Payment Solution. It unlocks the power of the mobile phone to make payments, allowing registered users to pay for goods and services at anytime, anywhere using only a mobile phone coupled with a 6-digit security PIN (Personal Identification Number) via SMS (Short Messaging Service). This gives the freedom to shoppers to buy products online and pay the merchant using his/her mobile phone without being physically present at the store.

a
There is a great potential for mobile payment services in Malaysia since it is changing the behaviour of users and increasing the demand over time. Supportive actions and collaborations with banks and handset vendor will helps in speed up this demand. Beside, mobile money might replace cash or face to face transaction since it is so convenience and safe to deal with. Furthermore, people now a day become more and busier, mobile payment will helps them to save time and sometime also the transportation fee.
a
Consumer adoption is necessary for the success of mobile payments, yet consumers may be not familiar with this payment technology. Mobile money has adopt 3 different strategies to increase consumer adoption in this system: i. Secure Mobile money provides highest security to protect their user while doing payment. They conform to best practices in the industry, participating banks and regulated relevant authorities. ii. Rewarding Mobile Money rewarded user while shopping or purchasing using Mobile Money system.

a

a

a

http://www.ngrguardiannews.com/compulife/article02//indexn2_html?pdate=070109&ptitle=GSMA%20insists%20on%20single%20wire%20protocol

Monday, February 9, 2009

Electronic Currency

Electronic currency (also known as electronic money, digital money, digital or digital currency) refers to money or scrip which is exchanged only electrometrically. Typically, this involves use of computer networks, the internet and digital stored value systems. Example of electronic currency such as Electronic Funds Transfer (EFT) and direct deposit Also, it is a collective term for financial cryptography and technologies enabling it.
a
Digital money is a system of debits and credits, used to exchange value, within another system. Also sometimes the term electronic money is used to refer to the provider itself. A private currency may use gold to provide extra security, such as digital gold currency like e-gold and c-gold. Many systems will sell their electronic currency directly to the end user, such as Paypal and Webmoney.
a
a
Advantages
a
Banks offer many services to the customer that transfer funds, contribute to their retirement plans and offer a variety of other services without having to handle physical cash or checks. Customers do not have to wait in lines and this provides a lower-hassle environment.
a
Debit cards and online bill payments allow immediate transfer of funds from an individual's personal account to a business's account without any actual paper transfer of money. This offers a great convenience to many people and businesses alike.

a
a
Disadvantages
a
Although many benefit to electronic currency, there are also many disadvantages. These include fraud, failure of technology, possible tracking of individuals and loss of human interaction.
a
Fraud over digital cash has been a pressing issue in recent years. Hacking into bank accounts and illegal retrieval of banking records has led to a widespread invasion of privacy and has promoted identity theft.
a
a
Future evolution
a
Furthering network evolution in terms of digital cash development, a company named Digi-Cash is at the focus of creating an e-cash system that would allow issuers to sell electronic coins at some value. When they are purchased they come under someone’s own name and are stored on his computer or under his online identity. At all times, the e-cash is linked to the e-cash company and all transactions go through it, so the e-cash company secures anything that is purchased. Only the company knows your information and will properly direct purchases to your location.
a
a
a

Saturday, February 7, 2009

How to safeguard our personal and financial data

Internet is a global system of interconnected computer network consists of millions of private and public networks of local to global scope. Nowadays, most of us will rely on computer to store our personal data and use online financial service to perform financial transactions such as online banking, transfer money. We should have adequate safeguard to protect the confidential data from being stolen.
a
a

a

a

Here are a few approaches on how to safeguard our personal data

a

a

Password protect
a
Choose your password wisely. While you want to choose something you'll remember, you don't want it to be something that a clever thief could figure out just by learning your birth date or your child's name. A combination of uppercase and lowercase letters, numbers, and symbols will offer you more security. And remember do not reveal any personal information or passwords to anyone.
a
a
Keep credit cards to a minimum

a

Use a credit card with a small limit for online purchase. It's all too easy for a dishonest sales clerk to use your credit card information. If the card you use for these purchases has a low credit limit, at least felon won't be able to rack up many bills before hitting a wall.
a
a
a
Install antispyware and antivirus software a
a
Protect your computer's security by using anti-virus software, spyware, firewalls to guard your computer information from the nefarious.

a

a

a
a
Avoid using public computer for accessing financial information a
a
Avoid logging on to check your bank balance using a public computer or coffee shop that offers wireless access. After using any of the Financial Data Center or member services, it is a must to log out before leaving the Financial Data Center. If you are using public computer , must remember to close the browser window. That is to prevent other users from reading your personal information and mail.

a a

a

Guard your Social Security number
a
Make sure that anyone asking for your Social Security number really needs it. Often businesses that ask for a Social Security number can use an alternative customer identification number if you ask. Make sure not to print your Social Security number on checks or in other highly visible places.Store your card in a safe place and avoid giving the number to others.
a
a

a

a
Avoid click on pop-up
A
You are not encourage to click on pop-up ads or download any information from unknown sites. Never open an attachment or click on a link sent to you by an unknown party. Attachments can contain viruses and links can lead unsuspecting users to dummy sites where they are asked to input financial information. a a
a
a

a

Avoid giving personal information to anyone who anyone who solicits you over the phone , mail or unknown 3rd parties.

a a a a

a a a a a a a

Review credit report frequently to check whether the amount is accurate.
a
a a
a a a a
a
a
Update your browser. Updating your browser on a regular basis can help plug up security holes. a a a a a

a

a

a

a

http://www.fool.com/personal-finance/general/2006/09/23/safeguard-your-financial-life.aspx

Friday, February 6, 2009

The Application of 3rd Party Certification Programme in Malaysia

Third parties are also called as certificate authorities (CAs), who issue digital certificate to provide verification that your website does indeed represent your company. As part of a public key infrastructure (PKI), a CA checks with a registration authority (RA) to verify information provided by the requestor of a digital certificate. If the RA verifies the requestor's information, the CA can then issue a certificate. The certificate may includes the owner's public key, the expiration date of the certificate, the owner's name, and other information about the public key owner.
a
MSC Trustgate.com Sdn Bhd is a licensed Certification Authority (CA) operating within the Multimedia Super Corridor. MSC Trustgate was incorporated in 1999 to meet the growing need for secure open network communications and become the catalyst for the growth of e-commerce, both locally and across the ASEAN region. As a CA, Trustgate’s core business is to provide digital certification services, including digital certificates, cryptographic products, and software development. The company is aimed to enable organizations to conduct their business securely over the Internet, as much as what they have been enjoying in the physical world.
a
Besides, there is another company which is VeriSign, Inc.. This company provides a critical layer of intelligence and security that enables key transactions, protects data and safely delivers information across myriad protocols and devices. Moreover, VeriSign is the leading Secure Sockets Layer (SSL) CA which also enabling the security of e-commerce, communications, and interactions for Web sites, intranets, and extranets. It provides security solutions to protect an organization’s consumers, brand, Web site, and network.
a
How does this certification program helps?
a
This 3rd party certification program helps to ensure that consumer’s information are safely travelled over the Internet and reaches the intended recipients. Now a day, there are a lot of threats spreading around the internet, this program could help in enable a fair deal between seller and buyer over the internet.
a
Furthermore, this program would enhance customer confidentiality over online shopping as it could provide e-mail protection and validation, secure online shopping carts and others services in avoiding damages from malicious software.
a
a
a
In other words, the application of 3rd party certification programme in Malaysia has a high possibility to increase the profit of any organisation that using E-commerce in way of enhancing customer trust and confidents towards the deal.
a
a
a
a

Thursday, February 5, 2009

Example of Phishing and its Prevention

What is phishing?
a
Phishing is a fraudulent attempt usually made through email to steal your personal information. The best way to protect your self from phishing is to learn how to recognize a phish. Phishing emails usually appear to come from a well-known organization and ask for your personal information such as credit card number, account number or password.
a
a
a
a
a
a
a
a
Examples of phishing
Internet criminals to successfully "phish" your personal information, they must get you to go from an email to a website. Phishing emails will almost always tell you to click a link that takes you to a site where your personal information is requested. Legitimate organizations would never request this information of you via email.
a
a
Examples: Phishing email / Phishing website
Approaches to Prevent Phishing Attacks There are several ways to prevent phishing attacks:
1) Educate users to understand how phishing attacks work and be alert when phishing-alike e-mails are received.
2) Use legal methods to punish phishing attackers.
3) The Web master of a legal Web site periodically scans the root DNS for suspicious sites (e.g. http://www.1cbc.com.cn/ vs. http://www.icbc.com.cn/).
4) Enhance the security of the web sites: The business Web sites such as the Web sites of banks can take new methods to guarantee the security of users’ personal information. Method to enhance the security is to use hardware devices. Before shopping in the net, users need to insert their credit card into the card reader, and input their PIN code, then the card reader will produce a onetime security password, users can perform transactions only after the right password is input
5) Block the phishing e-mails by various spam filters: Phishers generally use e-mails as ‘bait’ to allure potential victims.
6) Install online anti-phishing software in user’s computers. The anti-phishing tools can be divided into two categories: blacklist/white list based and rule-based.
• Category I: When a user visits a Web site, the anti-phishing tool searches the address of that site in a blacklist stored in the database. If the visited site is on the list, the anti-phishing tool then warns the users.
• Category II: this category of tools uses certain rules in their software, and checks the security of a Web site according to the rules.
a
a

Wednesday, February 4, 2009

A Review on a Post on *Internet Security* from My E-Commerce Blog -* The IMPACT*-

aaaaaaThe user of internet is increasing in every single day, internet now a day is acting an important role to everyone. Internet is useful because it could help people in learning, communicate, exchange information and so on. However, there is also an increasing number in hacking and computer viruses & theft. Some Anti Virus Software is no longer useful as they maybe outdated or some new computer viruses cannot be recognizing by those Anti Virus Software. Indeed, it is really harmful to every internet user as the threat keep on circulating in their computer.
a
aaaaaaIn recent year, Malaysia is ready to make an impact in the battles against cyber-terrorism and this mission is carried out by a non-profit organisation which is known as International Multinational Partnership Against Cyber Terrorism (IMPACT). This idea was brought out by our Prime Minister Datuk Seri Abdullah Ahmad Badawi at the World Congress on IT in Austin, US, 2007. The Government has approved RM43mil in setting up the IMPACT. Some leading names in the IT industry such as Symantec Corporation (United States), Trend Micro (Japan), F-Secure (Finland) and KaperskyLab (Russia) have agreed to be key partners and serve on IMPACT's international advisory board. In Malaysia, there are two local IT companies cooperate in running and coordinating IMPACT, they are Ascendsys Sdn Bhd (security service company) & GITN Sdn Bhd (government IT network company).
aaaaaaIMPACT serve as a pioneer platform to allow governments of the world to exchange notes & ideas, as well as to facilitate the sharing of skills and best practices, with the ultimate objective of combating these constantly evolving threats. It is good to have an organisation to help to against internet security problem as e-business become more and more common to us. If internet security cannot be improve or even become more and more bad, they will be a great harm to all internet users. However, in my opinion, governments should move faster and harder towards their goals as we (internet user) wish to have more secured in using internet.

The Chairman of IMPACT -- Mohd Noor Amin

a
a
Source : My Ecommerze a

Tuesday, February 3, 2009

The threat of online security: How safe is our data?

The internet is one of the wonders of the world. But it has a dark side, just like a beautiful city that has bad neighborhoods. Online security threats are one of the biggest challenges on the Internet today. Online Security Threats come from the fact that Windows basically records everything you do; most importantly it records the web sites you visit, whether intentionally or not, and keeps copies of all the images and pictures you have viewed, including those on web pages. It is no longer unusual for others to investigate exactly what you have being doing on your computers. Therefore, we need to know what threats are out there before we can be wary of it.
a
a
Threat to your privacy
The internet makes it easy for online criminals to attack your privacy: a
a
Accidental Actions
Accidental actions contribute to a large number of computer security risks. This category encompasses problems arising from basic lack of knowledge about online security concepts and includes issues such as poor password choices, accidental or erroneous business transactions, accidental disclosure, and erroneous or outdated software.
a
a
Hacking
Hacking is the act of illegally gaining access to your computer/sites for the sole purpose of destroying, disrupting or carrying out illegal activities on your system. A "hacker" is the person who illegally gains access. Hackers generally look for personal information, such as passwords or credit cards numbers. They may also be trying to use your Internet connection to transit their own material—or they may just be searching at random to see what they can find. However, there are many technologies out there you can use to prevent and detect hacking. A firewall, a program designed to prevent unauthorized Internet users from accessing your system, is the best way to protect your computer from intrusions.
a
a
a
a
a
a
Wi-Fi eavesdropping
If you use a wireless, or Wi-Fi, network you’ll know that it lets you connect to your broadband internet connection using a radio link with a range of several hundred feet. However, this flexibility has a downside. A more sinister risk is that people can, with the right equipment, spy on you and gain access to your computer over the wireless link.
a
a
Spyware
Spyware doesn’t try to replicate itself like a virus. Instead, it relies on people downloading it mistakenly, often alongside other programs such as peer-to-peer music sharing programs. It causes a range of problems, including:
a
º Annoying pop-up adverts.
º Taking over your web browser.
º Scanning your computer for private information like credit card numbers.
º Slowing down your computer and internet connection.
º Downloading viruses.
º Being very difficult to remove.
a
a
Threats to your wealth
Fraud
Fraud is a growing problem online. Conmen are the dot.com entrepreneurs of crime. Common tricks include:
a
#Phishing Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. Typically, the messages appear to come from well known and trustworthy Web sites. Web sites that are frequently spoofed by phishers include PayPal, eBay, MSN, Yahoo, BestBuy, and America Online. If you suspect phishing, do not reply to the e-mail or respond by clicking on a link within the e-mail message.
a
a
a
Identity theft
Online identity theft comes in many forms and involves the use – by someone else – of your computer and/or the information on it. Some identity thieves use an array of techniques known as social engineering to try to manipulate you into performing certain actions or divulging confidential information. Or, they may access sensitive information without you even being aware of their presence. With this information they can, for example:
a
º Empty your bank account.
º Max out your credit cards buying stuff for themselves.
º Buy cars on tick, in your name.
º Impersonate you online, for example using your identity in online auctions or e-commerce site.
a
a
Malicious Attacks
Attacks that specifically aim to do harm are known as premeditated or malicious attacks. They can be further broken down into attacks caused by malicious code and those caused by intentional misrepresentation. Misrepresentation is most often seen with regard to on line fraud and identity theft. Notable examples of which include computer viruses and Denial of Service (DOS) attacks.
a
# Computer virus
Viruses are small, malicious computer programs that try to infect computers, spreading from one machine to the next. There are four main classes of viruses:
File infectors- imbed themselves into ordinary executable files and attach to other system executables when the file is run.
System or boot-record infectors- infect the first sector on a driver from which the operating system is booted-up.
Macro viruses- infect data files that include scripting "macros."
Multi-part viruses- viruses that use more than one attack method.
a
Look for these clues to determine if your computer is infected with malware:
º A sudden increase in pop-up ads,
º A browser that takes you to sites other than those you type into the address box (also called hijacked browser),
º Sudden or repeated changes in your computer’s home page,
º New toolbars or icons,
º Keys that suddenly don’t work,
º Sluggish or slow performance when opening programs or saving files.
a
a
Denial of Service Attacks
It is another form of malicious code, are carefully crafted and executed. It is an attack on website in which an attacker uses specialise software to send a flood of data packets to the target computer with the aim of overloading its resources. it may cause a network to shut down masking it impossible for user to access the sites. Denial of Service Attacks is not new, yet they are growing in sophistication. Traditional DOS attacks usually involve one computer attacking another, but the use of multiple computers in a highly organized attack is known as Distributed Denial of Service Attacks (DDOS) becoming increasingly common. The DDOS attacker strategically builds an army of key players including:
a
º one client machine for coordinating the attack;
º three to four host machines, which are battlefields under the attacker's direct control; and
º potentially hundreds of broadcasters, which are the legions that run the code to generate the flood of packets that aaattack a target system

http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci916037,00.html http://www.getsafeonline.org/nqcontent.cfm?a_id=1168 http://www.raymondjames.com/privacy_security/online_threats.htm http://www.bsagovernment.com/downloads/MajorOnlineThreats.pdf