If you are having trouble viewing this email, click here to view this online  |
|
VOLUME 34 | ISSUE
34 |
22 May 2014 | |
| | Article of the Month | | | | Around the World | |
Preventing Technology
Addiction, Ways and Methods
 | |
In this series I�m going to
discuss what is technology addiction, what makes technology addictive,
what are the consequences being addicted to the technology, ways to
prevent being addicted to the technology. Throughout the series, I will
use plenty of simple examples as much as possible for your easy
understanding.
Could you find a small grocery shop in a remote village without an
electronic calculator on the cashier's table? Similarly, could you find
a person who does not have a mobile phone today? In my opinion, the
answer for both the questions is �Very difficult to find�. I believe, as
the reader, you agree with this answer. However, what do I really mean
here? | | | | | |
Technology exists everywhere and every corner.
Next, we look at another aspect of the question of the calculator. As you
know, a basic electronic calculator is a device that provides simple
arithmetic functions such as addition, subtraction, division and
multiplication of decimal numbers touching of few buttons. Though some
advanced calculators provide more functions, I just focus on a basic
calculator in this scenario.
Here is the challenge. If you use a calculator all the time to perform your
daily calculations, the day your calculator does not function, how good you
are doing your basic arithmetic calculations either using your memory or a
pen and a paper? One may argue, use your mobile phone�s calculator function
to perform the same calculation. It is not the point. I want to see the
challenge, how good you are doing some simple calculation without using any
electronic device. To understand this, I would recommend you to write down
first ten prime numbers in a piece of paper vertically, and try to derive
the total of those numbers without using a calculator. Make sure you note
down start time and end time. So that, you know the time taken to calculate
the total. Then, do the same addition using a calculator. Again note down
how long it took for you to perform it. Which approach took the longest
time? For an average student, manual method may take considerably a longer
time than the calculator assisted method since the present younger
generation is very familiar with electronic gadgets like calculators.
Assume that your calculator is
misplaced and your mobile phone�s battery is dead. But still you have to do
the above mentioned calculation; find the sum of first ten prime numbers.
What would be your 1st approach? There are three obvious choices. Choice one
is search for the missing calculator. Second choice is recharge your mobile
phone for few minutes and use the phone�s calculator function. Third choice
is adding the numbers manually. You may suggest more choices. However, I
believe for most of you, the last choice would be adding the numbers
manually.
What I described above is a typical example of technology addiction. Even
for a simplest thing that you can do with your basic skills, you tempt to
depend upon technology.
Similarly, what about addicting to the Internet, social media, computers,
computer games, smart phones and tablets? I will elaborate such areas in
detail on forthcoming articles.
Source: The Internet
.M. D. N. Fernando (CISSP) :
Manager � Infrastructure, Cargils Ceylon PLC.
Freelance writer specialising in preventing technology addiction.
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | . | | . |
| | | | | | | | | | | | | | | | | | | | |
| |  | | |
|  | |  |
Experts warn against judging Firefox on poor Pwn2Own
performance | | |
 '..Mozilla
Firefox was the loser in this year's Pwn2Own hackfest, but experts warn
against placing too much importance on the number of zero-day
vulnerabilities found in the Web browser...' | | | | | |
 |
EBAY TELLS USERS TO CHANGE THEIR PASSWORDS AFTER
CYBERATTACK |
| |
 '....Early
this morning, a message asking all users to change their eBay passwords
appeared on the community homepage and press page of PayPal, an
eBay-owned company. The message was ominous, but mostly blank....' | | | | |  |
iBanking Android malware disguised as legitimate apps | | | |
 | |
| |
'....On underground cybercrime markets, iBanking is a well-known piece of
malware, and one of the most expensive ones, too.
"iBanking often masquerades as legitimate social networking, banking or
security applications and is mainly being used to defeat out-of-band security
measures employed by banks, intercepting one-time passwords sent through SMS,"
shared Symantec researchers. "It can also be used to construct mobile botnets
and conduct covert surveillance on victims."
.....' | |  |
Record month for Linux Trojans | |
|
 | | |
'...If you think that you are protected from malware if you use Linux, think
again, warn researchers from AV manufacturer Dr. Web, who identified and
examined a record-high number of Trojans for Linux this month - and the
month isn't over yet....' | |
| | |  |
Iran's Cyber Attack Capabilities Growing Quickly:
Experts | | |
 | | | | |
| | '...Iranian
cyber-attackers are increasingly moving away from politically motivated
attacks such as Website defacement to cyber-espionage, targeting the
U.S. defense industry sector, FireEye researchers outlined in the
"Operation Saffron Rose" report. What was lost�or glossed over�in the
rush to discuss the actual tactics used by these attack groups was the
fact that this shift in sophistication has striking similarities with
how Chinese attack groups evolved over the past few years....' | |
|
| Month in Brief | | Facebook Incidents
Reported to Sri Lanka CERT|CC in
April 2014 | |
 | | | | | | | Statistics - Sri Lanka CERT|CC |
| |
| Alerts |  |
Malvertising up by over 200% | | | |
 | |
'....Online Trust Alliance (OTA) Executive Director and
President Craig Spiezle testified today before the U.S. Senate�s Homeland
Security and Governmental Affairs Permanent Subcommittee on
Investigations, outlining the risks of malicious advertising, and possible
solutions to stem the rising tide...' | | |  |
When Networks Turn Hostile | |
 | |
'....We�ve previously discussed how difficult it is to safely connect to
networks when on the go. This is particularly true on vacations and
holidays, where the availability of Internet access is one of the most
important factors when looking for a place to stay. In fact, many holiday
lodges and hotels today have made Wi-Fi access an integral part of their
offered amenities. With all the fun and relaxation set before you, it is
easy to take secure Internet access for granted.....' |  |
10 Big Data Pros To Follow On Twitter | |
 | |
'....Twitter's kind of an ironic place to look for big data wisdom. It's an
example of the ubiquitous services used by consumers and businesses alike
that help generate this avalanche of data in the first place.....' |  |
Over 90 Arrested in Global FBI Crackdown on
Blackshades RAT | |
 | |
'....A collaboration between the FBI and law enforcement agencies in 17
other countries has netted 90 arrests across the globe, all in association
with the Blackshades remote access Trojan (RAT). The investigation was aided
by one of the malware's co-creators......' |  |
VOBFUS Evolves, Adds Multiple Languages | |
 | |
'....VOBFUS malware is known for its polymorphic abilities, which allow for
easy generation of new variants. We recently came across one variant that
replaces these abilities for one never seen in VOBFUS malware before�the
ability to �speak� several languages....' | |
| | |
| | | Notice Board | | | Training and Awareness Programmes
- May 2014 | | |
|
| | | | | Date | Event | | Venue | |
| | | | - |
20th -21st May |
Development of module
for �Graphic Designer� courses under National Vocational
Qualification | | IComputer
Laboratory, ICT Branch | | |
29th May |
Safe web learning
programme | |
Water's Edge,
Battaramulla | | - |
26th - 30th May |
A/L ICT training | |
Education Leadership
Development Center, Meepe | | |
22nd-25th May |
Content Development for
LMS � Special Education and ICT | |
Education Leadership
Development Center, Meepe |
|
| | | | | Brought to you by: | |
|  | |
| |