cybersecurity

PISMP teachers achieve excellent performance – Radzi


Dr Radzi Jidin

KUALA LUMPUR (Aug 11): The performance of graduate teachers from Bachelor in Teaching Programme (PISMP) offered at Teacher Education Institutes (IPGs) is at an excellent level and meets the schools’ needs.

Senior Minister of Education Dr Radzi Jidin said based on the assessment conducted by school administrators from the period of 2015 until 2019, the IPG graduate teachers had an average score of 92 per cent and above.

“The MOE (Ministry of Education) implements an assessment method on the PISMP teachers by obtaining feedback from school administrators one year after they had started teaching and generally (school administrators) are satisfied with the teachers’ performance and quality,” he said during Minister’s Question Time at the Dewan Rakyat here today.

He was replying to a question raised by Dr Maszlee Malik (Bebas-Simpang Renggam) who wanted to know the measures and initiatives taken by the ministry in maintaining and improving the quality of PISMP so that the standard of teaching will always be excellent.

Radzi said MOE was always committed to empowering teacher’s education by strengthening the PISMP programme including its candidate selection process and curriculum in order to produce trained and competent teachers. – Bernama

— MORE TO COME —










Source link

virus, protection, coronavirus

Dr Yii: RM1,000 fine for not wearing face masks in public places too high especially for lower income group

KUCHING: Bandar Kuching MP Dr Kelvin Yii is urging the government to revise the blanket RM1,000 fine imposed on offenders for not wearing face masks in public places in the midst of the Covid-19 pandemic.

Dr Yii said the RM1,000 fine is too high especially for the lower income group.

Not only they may not be able to afford to pay up the fine, they may not even have enough to buy face masks in the first place, he argued.

“To me the RM1,000 fine for not wearing face masks in public places is too high especially for the lower income group who may forget to wear their face masks. They may not know of the policy or standard operating procedures (SOP).

“If we look at Victoria, Australia, their fine for an offender is A$200, which is about 6.7 per cent of Australia’s minimum income. Whereas in Malaysia, RM1,000 is about 83 per cent of the RM1,200 minimum wage.

“This is not fair considering our principle is to educate, not just to punish,” Dr Yii said in his debate on the motion of thanks for the royal address by the Yang di-Pertuan Agong during the Dewan Rakyat sitting this morning.

He suggested for the government to impose fines in stages, where first time offenders may be fined between RM200 and RM300, with the fine escalating for repeat offenders.

He said if the fine is too high as it is now, this may also open up opportunity for corruption among the enforcers.

Dr Yii also suggested for the government look into ways to provide accessibility to face masks and the use of reusable masks like what is being implemented in Singapore.

He said on Australia’s government official website, they even have a video showing how the public can make their own fabric masks at home.

On a related topic, Dr Yii also urged the government to clarify on the mandatory face mask policy especially on the definition of “public places”.

He said some of his constituents were confused on what is considered as public places because there have been no specifics gazetted or listed in any official government websites or publications.

“What was announced by the minister (Datuk Seri Ismail Sabri) was very general, like public transportation, markets, shopping malls and other public places.

“This definition is too general and is causing confusion. If we look at the model in Australian, their government listed all the places that face masks are needed to be worn, including some exemptions,” said Yii.






Source link

N. Korea declares emergency after ‘runaway’ virus defector returns


North Korean leader Kim Jong Un convened an emergency politburo meeting on Saturday to implement a “maximum emergency system and issue a top-class alert” to contain the virus, official news agency KCNA said. – AFP photo

North Korean authorities have imposed a lockdown on the border city of Kaesong after discovering what they called the country’s first suspected case of the novel coronavirus, state media reported Sunday.

Leader Kim Jong Un convened an emergency politburo meeting on Saturday to implement a “maximum emergency system and issue a top-class alert” to contain the virus, official news agency KCNA said.

If confirmed, it would be the first officially recognised COVID-19 case in the North where medical infrastructure is seen as woefully inadequate for dealing with any epidemic.

KCNA said a defector who had left for the South three years ago returned on July 19 after “illegally crossing” the heavily fortified border dividing the countries.

But there have been no reports in the South of anyone leaving through what is one of the world’s most secure borders, replete with minefields and guard posts.

Pyongyang has previously insisted not a single case of the coronavirus had been seen in the North despite the illness having swept the globe, and the country’s borders remain closed.

The patient was found in Kaesong City, which borders the South, and “was put under strict quarantine”, as would anybody who had come in close contact, state media said.

It was a “dangerous situation… that may lead to a deadly and destructive disaster”, the media outlet added.

Kim was quoted as saying “the vicious virus could be said to have entered the country”, and officials on Friday took the “preemptive measure of totally blocking Kaesong City”.

The nuclear-armed North closed its borders in late January as the virus spread in neighbouring China and imposed tough restrictions that put thousands of its people into isolation, but analysts say the North is unlikely to have avoided the contagion.

South Korea is currently recording around 40 to 60 cases a day.

Earlier this month Kim warned against any “hasty” relaxation of anti-coronavirus measures, indicating the country will keep its borders closed for the foreseeable future. – AFP










Source link

Police hit the brakes on Sarawak Day convoy in Miri for flouting condition

The participants marching through Miri Marina area to Miri Waterfront Commercial Centre. – Picture by Mohd Aliff Idzwan Abdullah

MIRI: A vehicle convoy to commemorate Sarawak Day here did not go on as planned after the police required its 50 participants to walk instead.

Miri Police Chief ACP Lim Meng Seah said the police had the right to stop any organiser from running their events if they fail to comply with the Peaceful Assembly Act 2012.

He said the law had been amended in 2019 to include Section 4 (1) which allows street protests including parades.

“We had informed the organisers that they cannot hold a vehicle convoy but they went against the condition. Therefore, the police have the right to stop their convoy,” he said when contacted.

He also said that police presence at the event this morning was normal as they have to monitor the event under Section 15 Peaceful Assembly Act for security and sensitivity.

A letter, sighted by The Borneo Post, from the police to the organiser on July 21, 2020 had stated that a vehicle convoy was not permitted.

Signed by Lim, the letter said the police only allowed a parade on foot and in accordance with a list of dos and don’ts.

The event was jointly organised by Members of Gabungan Anak Sarawak (Gasak), Sarawak for Sarawakians (S4S) and Sarawak Independence Alliance (SIA).

A spokesman, Yeo Yaw Lee, said they were happy to carry on with their event after some misunderstanding among the event participants.

He said the 2020 Miri 722 Convoy was initially planned as a vehicle convoy to promote the significance of Sarawak Day but the plan was changed at the last minute to a foot parade due to Covid-19 pandemic.

He said they had targeted about 20 vehicles involving 30 to 40 participants for the convoy.

The parade, which lasted about an hour, started from the Miri Times Square to the Miri Waterfront Commercial Centre.

Source link

smartphone, city, skyline

New Flaw In Zoom Could Have Let Fraudsters Mimic Organisations

In a report shared with The Hacker News, researchers at cybersecurity firm CheckPoint today disclosed details of a minor but easy-to-exploit flaw they reported in Zoom, the highly popular and widely used video conferencing software.

The latest Zoom flaw could have allowed attackers to mimic an organization, tricking its employees or business partners into revealing personal or other confidential information using social engineering tricks.

We know, social engineering attacks may sound a bit boring, but someone used the same to put Twitter on fire just last night when hundreds of high-profile Twitter accounts were hacked to promote a cryptocurrency scam, all thanks to an employee’s compromised internal tooling account.

The said vulnerability resides in Zoom’s customizable URL feature dubbed Vanity URL, aiming to let companies create a custom URL on its subdomain and branded landing page, such as “yourcompany.zoom.us,” where the invitation link to a meeting then looks like https://organization_name.zoom.us/j/##########, instead of regular https://zoom.us/j/########## format.

CheckPoint team found that due to improper account validation, any meeting ID could have been launched using…

http://feedproxy.google.com/~r/TheHackersNews/~3/ImSuQYFpla4/zoom-vanity-url-vulnerability.html
Source link

abstract, lines, www

4 Dangerous Brazilian Banking Trojans

Brazilian Banking Trojans

Cybersecurity researchers on Tuesday detailed as many as four different families of Brazilian banking trojans that have targeted financial institutions in Brazil, Latin America, and Europe.

Collectively called the “Tetrade” by Kaspersky researchers, the malware families — comprising Guildma, Javali, Melcoz, and Grandoreiro — have evolved their capabilities to function as a backdoor and adopt a variety of obfuscation techniques to hide its malicious activities from security software.

“Guildma, Javali, Melcoz, and Grandoreiro are examples of yet another Brazilian banking group/operation that has decided to expand its attacks abroad, targeting banks in other countries,” Kaspersky said in an analysis.

“They benefit from the fact that many banks operating in Brazil also have operations elsewhere in Latin America and Europe, making it easy to extend their attacks against customers of these financial institutions.”

A Multi-Stage Malware Deployment Process

Both Guildma and Javali employ a multi-stage malware deployment process, using phishing emails as a mechanism to distribute the initial payloads.

Kaspersky found that Guildma has not only added new features and stealthiness to its…

Source link

smartphone, city, skyline

Hackers Target Military and Aerospace Staff by Posing as HRs Offering Jobs

Cybersecurity researchers today took the wraps off a new sophisticated cyber-espionage campaign directed against aerospace and military organizations in Europe and the Middle East with an aim to spy on key employees of the targeted firms and, in some case, even to siphon money.

The campaign, dubbed “Operation In(ter)ception” because of a reference to “Inception” in the malware sample, took place between September to December 2019, according to a new report cybersecurity firm ESET shared with The Hacker News.

“The primary goal of the operation was espionage,” the researchers told The Hacker News. “However, in one of the cases we investigated, the attackers tried to monetize access to a victim’s email account through a business email compromise (BEC) attack as the final stage of the operation.”

The financial motivation behind the attacks, coupled with similarities in targeting and development environment, have led ESET to suspect Lazarus Group, a notorious hacking group that’s been attributed to working on behalf of the North Korean government to fund the country’s illicit weapon and missile programs.

Social Engineering via LinkedIn

Stating that the campaign was highly…

Source link

face, networks, head

WebAuthn Passwordless Authentication Now Available for Atlassian Products

Atlassian solutions are widely used in the software development industry. Many teams practicing agile software development rely on these applications to manage their projects.

Issue-tracking application Jira, Git repository BitBucket, continuous integration and deployment server Bamboo, and team collaboration platform Confluence are all considered to be proven agile tools.

Considering how popular agile has become, it’s no wonder Atlassian now serves 83 percent of Fortune 500 companies and has over 10 million active users worldwide.

To help create a better experience for these users, Alpha Serve has developed WebAuthn add-ons to bring passwordless authentication to various Atlassian products. Having a more convenient and secure way to login to their Atlassian instances should be a welcome development for development teams.

How WebAuthn Works

WebAuthn is a browser-based security standard recommended by World Wide Web Consortium (W3C) that allows web apps to simplify and safeguard user authentication by utilizing registered devices as factors.

It relies on public-key cryptography to prevent sophisticated phishing attacks. WebAuthn is part of the FIDO2 framework – various…

Source link

tech, circle, technology

Chinese Researchers Disrupt Malware Attack That Infected Thousands of PCs

Chinese security firm Qihoo 360 Netlab said it partnered with tech giant Baidu to disrupt a malware botnet infecting over hundreds of thousands of systems.

The botnet was traced back to a group it calls ShuangQiang (also called Double Gun), which has been behind several attacks since 2017 aimed at compromising Windows computers with MBR and VBR bootkits, and installing malicious drivers for financial gain and hijack web traffic to e-commerce sites.

In addition to using images uploaded to Baidu Tieba to distribute configuration files and malware — a technique called steganography — the group has begun using Alibaba Cloud storage to host configuration files and Baidu’s analytics platform Tongji to manage the activity of its infected hosts, the researchers said.

The initial compromise relies on luring unsuspecting users to install game launching software from sketchy game portals that contain malicious code under the guise of a patch.

Once the user downloads and installs the patch, it accesses the aforementioned configuration information to download a separate program named “cs.dll” from Baidu Tieba that’s stored as an image file.

In the subsequent stages, “cs.dll” not only…

Source link

web, network, programming

New Android Flaw Affecting Over 1 Billion Phones Let Attackers Hijack Apps

Remember Strandhogg?

A security vulnerability affecting Android that malicious apps can exploit to masquerade as any other app installed on a targeted device to display fake interfaces to the users, tricking them into giving away sensitive information.

Late last year, at the time of its public disclosure, researchers also confirmed that some attackers were already exploiting the flaw in the wild to steal users’ banking and other login credentials, as well as to spy on their activities.

The same team of Norwegian cybersecurity researchers today unveiled details of a new critical vulnerability (CVE-2020-0096) affecting the Android operating system that could allow attackers to carry out a much more sophisticated version of Strandhogg attack.

Dubbed ‘Strandhogg 2.0,’ the new vulnerability affects all Android devices, except those running the latest version, Android Q / 10, of the mobile operating system—which, unfortunately, is running on only 15-20% of the total Android-powered devices, leaving billions of rest of the smartphones vulnerable to the attackers.

StrandHogg 1.0 was resided in the multitasking feature of Android, whereas the new Strandhogg 2.0 flaw is basically an…

Source link

Social media & sharing icons powered by UltimatelySocial
error

Enjoy this blog? Please spread the word :)