Whither Digital Privacy: Be afraid, be very afraid!

By: Sonny Zulhuda

imageA quick takeaway from a closed session on Students’ Digital Privacy yesterday at Le Meridien KL (June 7th, 2013), I’d like to share what California-based Jeff Gould presented.

The SafeGov.org CEO told the audience of their research findings, among others:

  • The high significance of Facebook “Like” in profiling the identity of FB users;
  • Real possibility of identifying a person via DNA reconstruction taken from a gum;
  • Telco’s effort to provide some form of customer’s surveillance as their enhanced service;
  • ISP’s role in protecting children privacy through contractual agreements with the users/subscribers

Many things shared which are not new issues but came with novel modus operandi. We just need to be vigilant.

The closed session was attended by representatives from Cybersecurity Malaysia, Parents Action Group for Education (PAGE), FOMCA, Microsoft Corp, India-based CUTS and some local universities. Mr. Rosly Yahil from Cybersecurity Malaysia spoke about various initiatives taken in Malaysian context in dealing with the issues.

During the Q&A session, I managed to share with the floor on several issues and development on data privacy in Malaysia: Continue reading

“Mirror mirror on FB Wall… Should you comment of them all?!”

(CASE CHAT ON ONLINE DEFAMATION)

By Sonny Zulhuda

ImageThe online wall that you have on your Facebook or other social networking sites is not like a wall in your private bedroom where you can always at your own freedom stick things from your own photos to class schedules, to your favorite Football Club posters. Those things would remain as your “private’ enjoyment and view.

But things that you, or others, post on your social networking sites wall is not private. There are people who share such wall and are ready to read your posts every time you have something new.

So this is a rather common-sense thing; just be careful, mindful and.. don’t do fool!

Let me just share with you this incident:

“Retiree to pay RM100,000 over FB posts

It was reported by the Star on October 1st, 2011, that a retiree from Penang has been ordered by a High Court here to pay a total of RM100,000 in damages and costs to a private automotive technology training centre where his son had studied over three defamatory postings on Facebook.

Continue reading

National Security in Digital Economy: Redefinition, Reaction and Legal Reform

By: Sonny Zulhuda

This is my latest paper that I recently presented in the 1st International Conference on International Relations and Development (ICIRD) organised by a consortium of Thai top universities, and held in the beautiful campus of Thammasat University, Bangkok, Thailand.

This paper investigates the need for global government and especially Malaysia to relook at and redefine the concept of national security amid the changing circumstances especially in relation to the country’s increased reliance on the information and communications technology (ICT).

The challenge is, the more a governance system is exposed to the Internet and ICT, the bigger the risks it would face. When the security of the system is not reliable enough to secure the system, information assets are at stake and the country’s critical information infrastructure (such as defence, communications, energy and medical systems) would become loophole that undermines national security.

Continue reading

“Social Engineering” a.k.a. Phishing

By: Sonny Zulhuda

Yay! I opened my Inbox this morning and I just won another LOTTERY I never participated in! Feeling lucky don’t you? This is what I just received:

 

 

 

PRIZE AWARD NOTIFICATION!!!

We are pleased to inform you of your Email Success in our Computer Balloting made today for winners from the AUSTRALIAN LOTTERY EMAIL AWARD, as part of our Promotional Draws held this month.

This is a Scientific Computer Game in which your Email Address was used. It is a Promotional Program by AUSTRALIAN LOTTERY EMAIL AWARD.It is a Promotional Program that chooses emails world wide to encourage Internet users; therefore you do not require buying Ticket to enter for it. This is an Email Internet Program were winners are randomly selected from all over the world through Computer Draw System and extracted from over 800,000 Email Addresses from Unions, Association and Corporate Bodies listed online.

Below are your Winning Details:
Reference No: 575061725
Batch No: 056490902/188
Ticket No: 07-42-97-66-11-00
Winning Number No: ILP/HW46704/08

Wow. You don’t think I would rush checking for the accuracy or genuineness of this award right? Of course not, because for one simple reason, this kind of message could not deserve even a curiosity let alone excitement. This is obviously a phishing message which is a gateway to identity theft.

Continue reading

Security Safeguards on e-Payment Systems in Malaysia: Analysis on the Payment Systems Act 2003

By: Sonny Zulhuda

This is an excerpt on my latest paper that was contributed to the International Conference on Legal, Security and Privacy Issues in IT (LSPI) that is currently held in the Catalonian city Barcelona, Spain on 3-5 November 2010.

This paper is an extension from what I wrote in my PhD thesis especially my comment on the Malaysian Payment System Act (PSA) 2003. The focus of the paper is on security-related obligation for the e-payment operators in Malaysia.

The abstract is as follows:

Continue reading

Multi-layered & Multi-role Approach to Address Cyber-crime

By: Sonny Zulhuda

One week at the end of the month of October, information security practitioners, auditors, managers and academia gathered in Kuala Lumpur Convention Center (KLCC) for a series of seminars, conferences and showcase on cyber-security. This annual event, held between 25-29 OCtober 2010 was named “The Cyber Security Malaysia Awards, Conference and Exhibition (CSM-ACE 2010)”, was mainly organised by Cyber Security Malaysia, a agency under the Ministry of Science, Technology and Innovation, Malaysia.

I was privileged to have been invited as co-speaker together with my colleague Prof. Dr. Ida Madieha from AIKOL in one of their Satellite Forum entitled “The Digital Forensics Forum (for Academicians and Researchers)” on Thursday, 28 October 2010.

Continue reading

Penal Code for Cyber Crime

By: Sonny Zulhuda

Cyber Crime is any crime that involves computer or computer system either as a target or as a medium. With this definition, one could should not be mistaken into thinking that cyber crime only takes place when a computer genius manages to interfere with a networked computer system, bypassing complicated security, encryption or any access-controlling mechanism.

Cyber crime includes those ‘conventional crimes’ in which the criminal has found a new way to launch their wrong-doing. by way of computer network or otherwise being facilitated by information technologies.

The legal role of addressing and curbing cyber crime can therefore be attributed to the conventional law of crime. In Malaysia, the main statute is the Penal Code.

Continue reading

  • August 2017
    M T W T F S S
    « Jul    
     123456
    78910111213
    14151617181920
    21222324252627
    28293031  
  • Visitor

    free counters

  • Enter your email address to subscribe to this blog and receive notifications of new posts by email.

    Join 1,574 other followers