Apple – Listen to Us, Before It’s Too Late!

Which is better – Mac or PC?

By now the eternal debate will have come on to the radars of even the most non-geeky types, and those who still don’t have a position on it – normally a passionate and unwavering one – are fast becoming extinct. Last week of course the ongoing debate was seriously influenced by news of the Flashfake botnet for Mac OS X. It seems that cybercriminals are now joining the large numbers of users migrating from PC to Mac…

More: Why/what/who/how? Read on…

Flickr photostream

  • Tianjing
  • Tianjing
  • Tianjing
  • Tianjing

Instagram photostream

Oman? – Yeh’ Man! Or – From Moscow Snow to the Arabian Heat.

Salam alaykom, everyone!

Next up on my spring globetrotting tour with T.T. – Muscat, the capital of Oman, for the Cyber Defense Summit. Here under the chandeliers were gathered together ministers and other government representatives, bosses of top corporations, the FBI and other legal enforcement bodies, and so on. The event was a closed one – as in, not open to the press. Ooh – secrecy! All the same I managed to fit in eight interviews.

Cyber Defense SummitA ceiling to be admired – just ask the gent in the orange head dress

More: Now for a few facts about the Sultanate of Oman

Enter your email address to subscribe to this blog
(Required)

The World’s Gone Virtual – So Have We.

Why and How We Decided to Protect the Virtual Environment.

Over the last dozen years in the IT industry all sorts has gone on, but in the main what happened was the blowing up, bursting, and blowing up again of bubbles. Thankfully, against this depressing backdrop there are several examples of how things should be done – stories of technologies passing through all the stages from conception to industrial mainstream. One of the most interesting examples of this is virtualization.

Virtualize Cartoon

To start, as per tradition in these tech-themed posts, let me go over the basics. For those who already know the basics of the topic, you can skip this by clicking here.

More: Agent-less malware protection vs Disadvantages of virtualization security…

We Just Keep Picking Winners: Not Only Ferrari, but Also a Centurion!

As I’ve mentioned here before, tearing up the rulebook is an internal slogan of our marketing department. Sometimes the proverbial tearing up of the rules occurs in explosive fashion (for example when we recently arranged for a Japanese Awa Odori dance to be performed at the Barcelona Carnival); other times, the ripping up takes place at a calmer pace and over a longer term. Incidentally, there’s a completely separate format – that of our philanthropic initiatives; but we tend not to harp on about these too much.

Anyway, let me tell you about another rulebook-shredder of the calmer, longer-term kind…

For several years our “face” in the Asia-Pacific region (APAC) was Jackie Chan. Everyone was pleased with this set-up, me included of course, and so we decided to continue in the same vein, but with a slightly different – Indian – slant, especially since KL’s prospects in this country are looking nothing less than spectacular. So in September 2011 we gladly announced that Sachin Tendulkar – the international cricketing legend – became our Brand Ambassador.

Brand Ambassador

More: So, what’s all the fuss about?

Cassandra Complex… Not for Much Longer.

Top o’ the day to ye!

It’s fair to say I’m a bit of an IT-paranoiac, and most of you will know by now I’m not one to hold my tongue about my fears of possible future Internet catastrophes, or the greed and degeneracy of cyber-wretches – plus the massive size of the threat they represent – and so on.

Because of this tendency for speaking openly and plainly I constantly get accused of purposefully frightening everyone (and in my own self-interest). But I don’t mind, even though it’s nonsense. So I’ll keep on calling a spade a spade – telling people what I think is right – regardless!

The evolution of cyber-Armageddon is moving in the predicted trajectory (proof it’s not just a matter of my frightening folk just for the sake of it); this is the bad news. The good news is that the big-wigs have at last begun to understand – to the extent that often in discussions on this topic are heard my horror stories of old practically word-for-word. Looks like the Cassandra metaphor I’ve been battling for more than a decade is losing its mojo – people are listening to the warnings, not dismissing and/or disbelieving them.

More: Five main problems for IT security …

Wham, Spam, Thank You Ma’am: The Quick Rise and Fall of Image Spam.

Here it is, the original Spam! Hmmm, yummy… but healthy? Is anything in a tin? Ok, will leave off the foodie lecturing just for today…

Spam

// It’ll be interesting to see if this post with the above pic in it will get through the anti-spam filters of those who subscribe to my mail-outs.

So here we are once again on a subject that it seems will never go away – spam, this time about a particular kind thereof – “image spam” – and the protective technologies that fight it.

I’ll start with a brief bit of historical background.

More: Detect in … 10 ms! …

“Think Different” as Much as You Like, but You Can’t Actually Be Different.

Howdy all,

Steve Jobs

Phew. Finally got through them all – more than 600 pages of the Steve Jobs biography.

Despite the abundance of waffle in this tome (about 80% of it could easily have been ditched without really losing much) the book’s still an interesting read, demonstrating well why Apple is as it is. I’d heartily recommend it to anyone interested in the history of, and prospects for, the IT industry; particularly to those who want to discover Steve Jobs’ take on the IT confrontations of both the past and the present – Apple against Google, Microsoft, HTC, Samsung and others; and also those who follow or engage in the eternal holy-war forums that debate which products are better, cooler, the prettiest, etc.

My thoughts on Apple and Jobs are mixed. I’m rapturous about some things, highly critical about others.

First, let’s look back at this ad from 1984:

More:

Emulation: A Headache to Develop – But Oh-So Worth It.

What’s an ideal antivirus? Something that would feature the following:

  • 100% protection from malware;
  • 0% false positives;
  • 0% load on system resources;
  • No questions asked of the user; and
  • Lasts forever and is for free!

Like anything ideal though, this is of course a fantasy – quite unattainable in real life. But it’s nevertheless still worthwhile contemplating since it provides a fixed reference point for security developers: every company can then try to get as close to the ideal as it can within the limits of its financial and professional resources.

More: An important but unheard instrument to combat unknown threats …