BREAKING

Friday, June 23, 2017

GEM to Broadcast Nippon TV’s The Music Day Live Across Asia


Wazzup Pilipinas!



World First: Dean Fujioka to Perform in Singapore as Part of the Live Event

GEM, the entertainment channel dedicated to the latest content fresh from North Asia, is set to broadcast Nippon TV’s highly anticipated THE MUSIC DAY event live across Asia on July 1.

In a world first for the popular Tokyo event, which features the who’s who of Japan’s music industry, Nippon TV has partnered with GEM to broadcast a performance by popular singer and actor DEAN FUJIOKA live from Singapore. As part of the occasion, GEM is offering fans the chance to win tickets to DEAN FUJIOKA’s performance and an exclusive fan meet session.

“THE MUSIC DAY is an iconic event on the Asian music calendar, and we’re excited to partner with Nippon TV to expand the concert’s reach to GEM’s viewers in Asia. DEAN FUJIOKA’s live broadcast from Singapore as part of the event marks a significant milestone for Japanese entertainment and we’re pleased that GEM is at the forefront of this industry evolution,” said Virginia Lim, Senior Vice President and Head of Content, Marketing and Production, Sony Pictures Television Networks, Asia.

“Dean is a hugely popular artist in our region and last year starred in GEM’s first original series, ‘We are Asia - Dean Fujioka & Friends’. The fact that he will perform live from Singapore during THE MUSIC DAY is an unprecedented way for GEM’s viewers to get real time access to him and to the magic of J-Pop. For THE MUSIC DAY fans in Tokyo, they get to experience a dynamic new city via our live broadcast.”

Hosted by idol Sho Sakurai from ARASHI, THE MUSIC DAY will air live on Saturday, July 1 from 4:45pm -10:00pm (3:45pm – 9:00pm BKK/JKT). A star-studded line-up of Japan’s biggest names promises a captivating event, including AKB48, Gen Hoshino, KEN HIRAI, Kyary Pamyu Pamyu, SEKAI NO OWARI, Perfume, Yuzu; as well as Johnny’s artists TOKIO, KinKi Kids, ARASHI, KANJANI EIGHT and KAME TO YAMAPI. 

Prepare to Defend Yourself: Learn Survival Techniques for our Troubled Times


Wazzup Pilipinas!

This June 24, Saturday at 2pm, come to the 5th level Events Center of Century City Mall for a Seminar to learn a martial art created for survival with and against weapons. This system of martial arts can be used with with whatever weapon you have or no weapons at all. It has been tested for personal and tribal survival. Use of all weapons is part of the system and specifically one of the many weapons categories covered in this seminar will be the hand axe or tomahawk. It is a commonly available tool that also can be a very hand personal protection weapon. Other weapons will be covered as well including knife, stick, sword, gun and empty hands. The only good defense is a good offense, and this art is separated from other martial arts by this concept.

FACTORYMMA brings Grand Tuhon Leo T. Gaje, Jr. Supreme Grandmaster Pekiti-Tirsia Kali System. Grand Tuhon Gaje pioneered the teaching of kali and authentic Filipino martial art on the east coast from his headquarters in New York City and introduced real full contact stickfighting across the United States producing both U.S. and Philippine national champions including the Grand Champion of the first (1st) national arnis (kali) tournament held in the philippines in 1979.

As national training director for the justice system training association and the United States police defensive tactics training association, Tuhon Gaje developed the safety baton system and edged weapon awareness/strategic knife defines programs.

Thursday, June 22, 2017

Cybercriminals Targeting Mac Users with Malware Attacks


Wazzup Pilipinas!


Apple devices no longer safe against security breaches as new attack opportunities and threat vectors make Macs an easier target

Fortinet, a global leader in high-performance cyber security solutions, cautions that Apple devices have recently become attractive targets for cyber attackers due to their fast growing popularity and user demographics. In many organizations today, C-suite executives and marketing teams are more likely to use Macs. These individuals not only share valuable information, they are also very often less technically savvy and therefore, less likely to back up their devices, encrypt stored data, or abide by security best practices.

New attack opportunities and threat vectors are also making the targeting of Mac devices easier and more attractive. For instance, Fortinet’s FortiGuard Labs threat research team is starting to see the development of hacking tools that target cross-compatible software.

In addition, it has become easier for cybercriminals to scale up their operations against Macs. Due to the rise of cybercrime-as-a-service, cybercriminals have started building malware “franchises”. Instead of targeting Macs one at a time like in the past, criminals can now leverage pre-built technology to attack vast numbers of potential victims in exchange for sharing profits on the back end. While ransoming one device may not be of much financial value to professional cybercriminals, owning hundreds of franchisees targeting thousands of devices every day most certainly is. At the same time, such an opportunity appeals to many small-time players, such as lone-wolf hackers working out of their parents’ homes.

“When it comes to security, the only constant is change, whether it is the way networks are evolving or how these changes are creating new opportunities for criminals,” said Aamir Lakhani, Fortinet Senior Security Strategist. “It is imperative that companies approach security from a holistic perspective. This includes making sure that every device is protected across all threat vectors, including Mac devices that were thought to be secure.”

In response to this new wave of brazen ransomware attacks, Fortinet recommends Mac users to take the following preventive measures:

1. Apply patches and updates. Apple regularly provides security updates. Users must make sure they take the time to apply them.

2. Backup your device. Apple’s Time Machine service will automatically create full system backups, which means that should a system get ransomed, one could simply wipe the device and perform a full system restore from backup. Regularly scan backups for vulnerabilities and store these backups offline. Offline storage is vital because Time Machine backup systems are often persistently connected to the device being backed up, and risk being compromised during an attack.

3. Encrypt data stored on device. While this may not be effective against many ransomware variants, it is still a good practice as it can protect an organization should any device become infected with malware that is designed to steal files and data.

4. Install an endpoint security client. Look for endpoint solutions that will not only protect your device, but tie that security back into your network security strategy, allowing you to leverage and share threat intelligence to better protect your device and its assets.

5. Deploy security that covers other threat vectors.  As email is still the number one source for malware and infection, ensure that a robust email security solution is deployed. The same is true for web security tools, wired and wireless access controls, cloud-based security, and network segmentation strategies that help detect, isolate, and respond to threats found anywhere across a distributed environment.
Ang Pambansang Blog ng Pilipinas Wazzup Pilipinas and the Umalohokans. Ang Pambansang Blog ng Pilipinas celebrating 10th year of online presence
 
Copyright © 2013 Wazzup Pilipinas News and Events
Design by FBTemplates | BTT