ATMs and student numbers rise across the UAE

The network of ATMs criss-crossing tourist hot-spots Dubai, Abu Dhabi and other popular destinations in the United Arab Emirates (UAE) is obvious testament to the huge strides taken in recent years by the Gulf country’s dynamic and expanding banking industry. However, there’s another sector that has rapidly grown, too, and it’s a success story that’s almost gone unnoticed. The sector in question is education.

A recent report forecasts that the number of ATMs – let’s call them cash machines – across the world is set to rise over the next few years by some 40 percent, up from 2.6 million last year to and estimated 3.7 million by 2018. Much of the growth will be driven by the Middle East and Africa and Asia Pacific regions, says the report.

Meanwhile, the number of students enrolling in UAE universities and other higher educational institutions has risen by 31 percent in the last five years, according to a report issued earlier this year by Dubai’s Knowledge and Human Development Authority (KHDA). The KHDA says that in Dubai alone, student numbers were up 11 percent in 2012.

And there’s more positive news. The UAE is now the fourth most attractive education destination in the world for students looking to pursue their studies abroad. The claim was made in an article in business magazine Gulf Business which cites the findings of a survey carried out by Dubai International Academic City (DIAC) and Deloitte.

The survey of 2,400 students and a number of companies across the Middle East, Africa and Asia found that the UAE was recognized particularly for its strength in science, finance, economics and management. The students identified Dubai as likely to be their educational destination of choice while the majority of companies described the city’s position as a centre for higher education as good or excellent.

The article says that according to the corporates surveyed within the study, there were 64 skills in high demand across sectors such as tourism and telecoms. There was potential to address some of the skill gaps identified by creating bespoke academic programmes and collaborating with existing academic partners to offer courses within the UAE or in the students’ home countries.

DIAC has been quick to respond to the findings, announcing in August that its universities will be increasing the number of courses on offer by more than 10 percent for the 2013/14 academic year. In direct response to industry demand, universities including Amity, Heriot-Watt and IMT will add an additional 35 degrees in tourism and hospitality, engineering and accounting to their existing portfolio, bringing the total number of degrees to 355. Of the new courses, 11 will be undergraduate, 17 postgraduate and 7 PHD programmes.

News of the new programmes follows a record year at DIAC, which has seen the likes of the University of Wollongong Dubai, Middlesex University and Amity University significantly increase their presence in Dubai – growth that is, in part, due to increased student numbers (20,000) and student enrolment numbers (26%).

DIAC managing director Dr Ayoub Kazim said he was delighted to see the universities expand the number of programmes on offer, particularly in STEM subjects (science, technology, engineering and mathematics), along with tourism and hospitality and accounting. This was a sure sign the higher education sector in the region was responding to the demands of local industry.

Check out the DIAC website here.

What is scareware?

When it comes to making us fall for their scams, cybercriminals have a number of tricks up their sleeves. One of these tricks is to scare us into thinking that our computers or smartphones have become infected with malware to get us to purchase a fake application. The programs and unethical advertising practices hackers use to frighten users into purchasing rogue applications are called scareware.

6DIn a typical scareware scam, you might see an alarming popup message while browsing the Web that says “Warning: Your computer is infected!” or “You have a virus!” You would typically see these messages if you accidentally clicked on a dangerous banner ad or link, or by visited a compromised website. The cybercriminals are hoping that you click on the link in the popup message to “run a free scan” and then purchase their phony antivirus software to get rid of the nonexistent problems.

Since these scams are based on fear mongering, you could see repeated popup warnings until you finally agree to download the rogue software that they say will fix the issue. But, instead of real antivirus software, you wind up downloading a malicious program. These programs can even disable the legitimate security software on your device, which can make scareware very difficult to remove.

These scams are one of the most persistent threats on the Internet today. They play on our fear of losing data, time, and money and leverage the urgency of popup messages and repeated warnings to get us to act.

Here’s some tips to protect you and your loved ones from scareware:

Only purchase security software from a reputable company via their official website or in a retail store, and keep your security software up-to-date.

Never click on a link in a popup—simply close the message by clicking on “X” in the upper corner and navigate away from the site that generated it.

If you are concerned that your device may be infected, run a scan using the security software you have installed on your device.

If you don’t already have security protection on all your devices, then try out McAfee LiveSafe™ service, which protects all your PCs Macs, tablets, and smartphones from online threats as well as safeguarding your data and identity.

Don’t let the bad guys scare you into taking actions that could do you and your devices harm. Stay safe online.

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  Disclosures.

Against the Odds — Do’s and Don’ts for Configuring a Secure PIN Number

Against the Odds — Do’s and Don’ts for Configuring a Secure PIN Number

We all know that someone who’s waiting for their ‘numbers to come up’ is hoping for a lottery win. However, to fraudsters your PIN number is the jackpot, and depending on the methods that you use to configure and protect your PIN number, they have a greater or slimmer chance of hitting it than winning the lottery.

Here are some of the mistakes that people make when devising their PIN number, and what you should do instead to create your own and avoid become a victim.

Writing down your PIN number

Some people take the risk of writing their PIN number on their debit and credit cards or keeping it in a compartment of the same wallet or purse as the cards themselves. Keeping both together is never a good idea. Both can fall into the wrong hands easily.

Of course, some people use the same number for every single credit card they own as they’re out and about on their travels. Again, that’s a bad idea. You should use a different one for each card.

If you really must jot it down somewhere, write it in an obscure place such as in the chapter of a book. No one would think to look in page 421 of War and Peace. Don’t tell anyone your PIN number, either— not even to your best friend (some do!).

Consecutive numbers or words

123456 is a common PIN that can be cracked with a “dictionary attack” program. Princess and Password are common too. It’s always best to mix things up, use phrases  combine letters, words and numbers and use upper and lower case.

Using a date with words

A popular way to remember one’s PIN number is to choose a date (or dates) that’s easy to remember. For most people, of course, that’s their birthday or wedding anniversary. But in the age of social media, this is risky, even with good antivirus protection. Many people publish their date of birth in their Facebook profile, unaware that they’re exposing themselves to potential fraud should (identity) thieves visit their profile.

A better use of the date method is to combine years (like when you and your spouse were born) or months (like when two of your kids were born) that you remember easily but which are obscure to others. Then choose a code word or phrase that links the two and will remind you of both dates. Like BrattyKiDs200708 or HappyMarried196566. Toss some upper case in there and your pretty secure.

Celebrate cybersecurity with Intel and McAfee life hacks

During National Cyber Security Awareness Month (NCSAM), Intel and McAfee are reaching out to digital citizens to come up with and share their favorite lifehacks. Lifehacks are tips and tricks to make life easier, more productive, interesting and just plain fun. Lifehacks are usually cheap or free and sometimes put money in your pocket. Best of all lifehacks are creative and often inspirational.

To celebrate NCSAM, Intel and McAfee are providing digital security lifehacks to get you on the fast track to online security.

Here’s a lifehack example: To get the best pricing when searching for airfare prices online, use the private browsing mode. Why?  I’m told that when searching online for airfare prices that the websites place tracking codes (known as cookies) on our computers or mobile devices so when we revisit those sites again to check if prices have changed, those sites already know the original prices we were quoted.

Here’s another one: Use single-use credit cards online. Why? When shopping online, you could be exposed to credit card theft if your computer is compromised or the site you are shopping on is not safe. A one-time use credit card is just that—it only works the one time you use it. It’s perfect for online shopping—even if someone hacks that credit card number, it won’t be valid any other time.

If your online privacy is important to you, why not take this month to share what you’ve learned with those you care about. To get involved and enter to win a free Ultrabook™ and McAfee LiveSafe™ subscriptions, go to mcafee.com/lifehacks to find more lifehacks to share.

This October, stay proactive in protecting yourself from the hackers, or you just might find scary things happening at your own computer, smartphone or tablet. To join the conversation, follow #HackYourLife on Twitter for more tips and updates.

Robert Siciliano is an Online Security Expert to McAfee. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked!  Disclosures.

Data brokers hacked and used for identity theft

Did you know you can buy Social Security numbers (SSNs) online? It’s legal to do so in most cases, and pretty much anyone who has an internet connection can make a purchase. Information brokers or data brokers, as they are known, sell this information in the form of background checks. In some instances, the SSN needs to be provided to get the background check; in other instances, the SSN is available as part of an information package. There are plenty of legitimate reasons one would have to procure this information.

Recently, researchers discovered a few of the major data brokers had been breached in a way that allowed criminal hackers to install malware that allowed them through the back door of the data brokers’ servers. As a result, these same hackers set up their own website reselling the hacked data. The customers of the hacked data, it seems, are identity thieves—many of them organized criminals using the data for various scams and to open new lines of credit or take over existing lines of credit.

CNET reports, “The service’s customers have, the report said, ‘spent hundreds of thousands of dollars looking up SSNs, birthdays, driver’s license records, and obtaining unauthorized credit and background reports on more than four million Americans.’”

This goes to show you that some of the largest companies on the planet that spend the most amount of money on security and have the most to lose are hackable…which means you and I are even softer targets, and our identities are at risk everywhere.

You can’t rely on your government or corporations to protect your identity. It is essential you take proactive action and do it yourself. There are two approaches that work best when done together. I do both; you should too:

  1. Get a credit freeze. Search “credit freeze,” then individually visit each credit bureau (Experian, TransUnion and Equifax) and follow their process for a credit freeze.
  2. Invest in identity theft protection. It’s not enough just to get a credit freeze. There are many times when your credit won’t be frozen, and when your data is used to either open new accounts or take over existing accounts—and depending on the identity theft protection service, you will be assisted to mitigate any fraud.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing  identity theft prevention. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247. Disclosures.

Streamlined ‘Passpoint’ WiFi coming

WiFi connects us everywhere, such as in parks, subways, airplanes, coffee shops and public WiFi hotspots. The WiFi Alliance says there are more than a million hotspots worldwide, and a report by market research company Informa Telecoms and Media (Informa.com) reports that Wifi hotspot numbers are set to grow to 5.8 million globally in the next four years.

4WWhile all this wonderful WiFi is everywhere, there are issues with seamless connectivity and security that can be alleviated with cooperation from the larger ISPs and device manufacturers. Right now, public WiFi is wide open and vulnerable to wireless sniffers. Without a virtual private network like Hotspot Shield VPN, the data on your wireless devices are vulnerable to criminals.

According to the Wi-Fi Alliance, Wi-Fi CERTIFIED Passpoint™ will transform the way users connect to WiFi hotspot networks by making the process of finding and getting access to the right network seamless. It also provides user connections with WPA2™ security protection, enabling you to feel confident that your data is safe. Mobile devices that are certified for Passpoint, such as handsets and tablets, can still be used in existing hotspots. However, when you are in a Passpoint-enabled hotspot, you’ll discover a newly smooth connectivity experience.

An added benefit to seamless WiFi means less data usage on a carrier’s 3/4G network. With carriers pretty much nixing unlimited data use, consumers are finding they have to upgrade their data plans so they don’t go over their limit. With Passpoint, data usage will go down when WiFi connections happen effortlessly.

This is all great news for millions of people now using their wireless digital devices exclusively. But always keep in mind that no matter what you are using—a laptop, tablet, reader or mobile phone—wireless is inherently insecure and until Passpoint becomes as ubiquitous, a VPN such as Hotspot Shield VPN is as an essential layer of defense for your wireless devices.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

Unsecured wireless video baby monitors hackable

Baby monitors have evolved from simple one-way radio communications based on older radio waves to highly evolved IP based, internet-connected cameras that can be viewed on a smartphone or tablet. Back in the day, when cordless phones were 900 MHZ, it was common to hear someone else’s conversations on your own phone or easy enough to eavesdrop on anyone’s call with a store-bought scanner.

Today’s baby monitors suffer a similar fate. While it’s all wonderful for a parent who wants to check out their little Johnny from afar, there are security issues with wireless technology if not properly locked down.

CBS New York reports, “The Gilberts, a family in Texas, found that a hacker gained access to their video baby monitor and was yelling at their 2-year-old daughter by name, having read it off her bedroom wall. ‘He was saying, “Wake up, Allyson, you little (expletive),” said the girl’s father, Marc Gilbert. ‘It felt like somebody broke into our house.’”

Scary.

Out of the box, most of these wireless technologies that allow people to control various home appliances from their smartphones are generally secure. However, in some cases, software or firmware may need updating if vulnerabilities are found.

  • Always check with a device manufacturer’s website to ensure the latest software/firmware or critical updates are installed or available to install.
  • Most wireless vulnerabilities start at the home/office wireless network and not on the devices themselves. It is essential to encrypt wireless with at least the WPA standard built into your router’s software.
  • Just like you need to encrypt wireless for your home/office network, you also need to encrypt wireless on public or free networks to protect the data on your devices. Hotspot Shield VPN is a free VPN option that encrypts all wireless communications.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

10 security tips when selling your house

The housing market is coming back, and lots of people are selling their homes—and you may be considering it too. Will you use a real estate agent or do it yourself? No matter which path you choose, there are safety and security considerations for both. When opening your home to strangers, the risks to your family’s personal security increase dramatically.

For one illustration, KHOU reports, “Two women are accused of posing as a real estate agent and prospective buyer to burglarize a house. They allegedly called her Realtor last minute to say they were close by. Police said the women had given the license number and name of a legitimate real estate agent to obtain permission to enter. Once inside, they allegedly took watches, jewelry and a credit card.”

When selling your home and someone knocks on the door and begins to con the homeowner with the above not-too-far-fetched scenario, more than likely the home owner will let him or her in.

Use caution—and, if you use a real estate agent, discuss the following:

  1. Recognize that when placing ads or displaying a yard sign, scammers will notice too. You are going to have to set boundaries and begin to think differently in this process. It’s never OK for anyone to enter your home unannounced. Even if a person set an appointment, it’s best to have a real estate agent along. And always pay attention to whoever enters. Don’t just let a stranger (even one claiming to want to pay hundreds of thousands of dollars for your home) roam free.
  2. Lock up: Remove your valuables or put them in a safe; medicines or anything else of resale value is often targeted. When suspecting or seeing someone steal something, just let the person have it. Never confront a thief, and never try to take it back. Leave your own house immediately, as a thief could turn violent instantly. Your job isn’t to prevent theft—merely to deter it.
  3. Be suspect: Being guarded and alert can keep you from getting into a vulnerable situation. Expect every bad guy or gal to show up in a nice car, well dressed, and even with family. Sometimes the person has business cards stating his or her profession. Regardless, don’t let your guard down.
  4. Signage and ads: Use advertising as your first layer of defense. Include phrases like “Appointment only” and “Driver’s license required for admission” and “Pre-approved documents required.” Include signage at the front door, such as “Video surveillance in use” or “Driver’s license required,” as well as signage showing you have a home security system.
  5. Use the buddy system: Strength comes in numbers. Having two or more people on site is best, so set appointments around spouse or friend availability.
  6. Identification: Request ID when people walk in. If they have a problem with this, then that’s a red flag and you need to tell them to leave.
  7. Determine any vulnerabilities: When showing a property, think in terms of where your screams would not be heard, such as a basement, attic, garage, etc. It may be necessary to send potential buyer to these areas alone.
  8. Dress appropriately: Expensive jewelry is a no-no. Pajamas or provocative attire sends the wrong message. Be professional.
  9. Intuition: Trust your gut and pay attention to your intuition. If something seems wrong, something is wrong.

10. Home security: Install a home security system with cameras. Not only does this help to secure the home, but it also increases resale value.

11 Easy and Simple Home Security Tips

Occasionally it’s good to be reminded of the fundamentals of home security. Print this out and stick it on your bulletin board at work or on your refrigerator as a reminder to everyone in your family.

  1. Daytime burglaries: Many burglaries happens during daylight hours; very few occur at night—which means even when you step out to go to the store at noon, set your home security system to alarm.
  2. Traveling: Have a neighbor keep an eye on your house and get your mail and newspapers and grab your barrels on trash day. During the winter, have someone clear the snow around your house to make it look like someone’s home.
  3. Trick the burglars: Do things like leaving a radio or TV on, and put the lights on timers. The idea is to always make your house looked lived in.
  4. Neighborhood watch: Get to know your neighbors, and note who is coming and going and what their vehicles look like.
  5. Call 911: If something seems wrong, it is wrong. Trust your gut. Don’t wait to call 911 if something does not seem right. React, respond, see something, say something.
  6. Exterior: Bushes and shrubs should be trimmed back from doors and windows.
  7. Home security systems and cameras: Wired or wireless, use a professional or do it yourself. Spend a little or spend a lot. Get it monitored or not. (I prefer monitored.) With some cameras, you can hear audio via video. Just get alarmed.
  8. Lighting: Use bright lighting around your home, including motion lights or lights on timers. I like timers better.
  9. Engraving: Engraving systems allow you to imprint your driver’s license number or address on valuable items. This helps police return recovered items when bad guys are busted.

10. Doors: Use strong, high-quality deadbolt locks. Consider door reinforcement technologies on the jambs and hinges and around the locks. Use solid-core doors. Beef up sliding doors, as older versions can be opened by an experienced burglar.

11. Windows: Bars on windows are an option, but a better option is locking them and using a shatter-resistant window film that helps prevent windows from being smashed in.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

Cellular Base Station Range Extenders Vulnerable to Attack

Low-powered cellular base stations are often found in residential homes and small businesses where mobile coverage is scant. The device, which also known as a femtocell, connects to DSL or cable connections and extends cellular coverage to a functional level where cell towers simply don’t reach. Some cellular base stations can accommodate up to 16 devices indoors or outdoors. The benefits of deploying a cellular base station include better voice quality and stronger wireless internet connections over 3G or 4G.

A few of the mobile carriers offering cellular base stations include Vodafone, SFR, AT&T, Sprint Nextel, Verizon and Mobile TeleSystems. The devices cost under a few hundred dollars and offer a significant improvement in areas with poor wireless connections.

While all this is good and dandy, researchers discovered a flaw in the firmware of a top mobile carrier that may affect up to 30 other cell network devices.

The Register reports, “Security researchers have demonstrated a flaw in femtocells that allows them to be used for eavesdropping on cellphone, email and internet traffic. The researchers bought a femtocell for $250, and used open-source software to test out the bugging attack. They also managed to boost the range of the femtocell to enable a much wider radius of data-slurping beyond the advertised 40-meter radius. Since the firmware of femtocells is seldom updated, an attacker could eavesdrop for some time before being detected.”

Once notified of the firmware flaw, carriers are supposed to communicate with base station clients with a firmware update and instructions on how to install it. However, just like a consumer’s PC not being properly updated with antivirus or operating system-critical security patches, it is doubtful many of the devices have been updated.

If you have a cellular base station deployed in your home or office, it is advised that you contact your carrier and/or search out your cellular base station’s model number to see if there is a patch—and install it. Otherwise, anyone connecting to cellular base station should employ a virtual private network software such as Hotspot Shield VPN to encrypt wireless communications.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.