Author: Admin

Bali and Jakarta, Indonesia – Late last year, Balinese woman Nih Lu Putu Rustini got the shock of her life when she tried to withdraw cash from an ATM to complete a renovation project at her ancestral home. Working as a cleaner during the day and a nanny by night, Rustini had saved 37 million Indonesian rupiahs ($2,340) in an account at Bank Rakyat Indonesia, Indonesia’s largest bank. But the ATM showed a balance of almost zero. When she visited her local BRI branch, a teller informed her that her money was gone. “They said a hacker had stolen my…

Read More

Background / Rationale:The global experience of the COVID-19 pandemic has demonstrated that whole-of-society action supported by effective leadership and governance is required to manage the systemic risks associated with biological hazards.  The pandemic has challenged risk governance in countries and catalyzed changes and innovations in policies, legislation, coordination mechanisms, financing and effective risk management that have significant implications for future disaster risk reduction policy and practice. Collaborative partnerships, good practices, lessons learned and evidence generated during COVID-19 will need to be institutionalized in order to strengthen systems and capacities to manage risks of disease outbreaks and other types of…

Read More

07 May 2024, 09:47 AM IST Pinarayi Vijayan | Photo: PTI Dubai: Chief Minister Pinarayi Vijayan has left for Indonesia via Dubai. He reached Dubai on Monday at 7 am. Since he was on transit, the CM, his wife Kamala, and his grandson did not leave the airport. They boarded the Indonesian flight at 10.10 am. The CM will be in Indonesia until May 12. Following that, he will be visiting Singapore until May 18 and will reach Dubai the same night. According to an unofficial statement, the CM will be staying in Dubai from May 19-21 and will be…

Read More

July 9, 2024Information hallCI/CD Security / Server Security Cybersecurity researchers have discovered that attackers can use misconfigured instances of the Jenkins Script Console as a weapon for further criminal activity, such as cryptocurrency mining. “Misconfigurations, such as misconfigured authentication mechanisms, open the ‘/script’ endpoint to attackers,” Shubam Singh and Sunil Bharti of Trend Micro said in a technical note published last week. “This could lead to Remote Code Execution (RCE) and abuse by attackers.” Jenkins, the popular continuous integration and continuous delivery (CI/CD) has a Groovy scripting console that allows users to run arbitrary Groovy scripts in the Jenkins controller…

Read More

Apple CEO Tim Cook said the company will “look at” manufacturing in Indonesia as he met with Indonesian President Joko Widodo on Wednesday.“We talked about the president’s desire to see manufacturing in the country, and it’s something that we will look at,” Cook told reporters after the meeting.Widodo’s administration has worked for years to bring manufacturing to the country to power economic development, while Apple is seeking to diversify its supply chains away from China, where most of its smartphones and tablets are assembled. The company began moving some production to countries like Vietnam, and more recently India, after shutdowns…

Read More

Jakarta, Indonesia : Rights groups have cancelled a Southeast Asian LGBT event in Indonesia after receiving security threats, the organisers said, the latest sign of increasing pressure on the community from religious conservatives in the country.Homosexuality is a taboo subject in Indonesia, the world’s most populous Muslim-majority nation, even though it is not illegal except in the sharia-ruled Aceh province.Other LGBT-related events have also been cancelled in Indonesia due to objections from Islamic groups. In December, the United States called off a visit by its LGBT special envoy after an influential clerical body denounced the visit.Jakarta was set to host…

Read More

The bulk of Indonesian government data affected by a recent ransomware cyberattack was not backed up, officials said, in an incident that has exposed the lack of preparations for such an attack in Southeast Asia’s biggest economy. Last week’s cyberattack, the worst in the country in recent years, has disrupted multiple government services including immigration and operations at major airports.Elevate Your Tech Prowess with High-Value Skill CoursesOffering CollegeCourseWebsiteIndian School of BusinessISB Product ManagementVisitMIT xPROMIT Technology Leadership and InnovationVisitIIT DelhiCertificate Programme in Data Science & Machine LearningVisit The government has said more than 230 public agencies, including ministries, had been affected,…

Read More

Background/RationaleThe COVID-19 pandemic along with concurrent emergencies, has exposed vulnerabilities and caused disruptions to health services in even the most robust health systems. Hospitals are a central to the resilience of communities, countries and their health systems. Global frameworks for disaster risk reduction have recognized the important role of hospitals in local and national action to manage the risks of emergencies and disasters. Countries have established programs and conducted activities aimed at strengthening the safety and preparedness of health facilities so that they can operate with maximum functionality during emergencies and disasters. WHO and partners have developed and supported…

Read More

EDITOR’S NOTE: Please be advised that this Yogyakarta travel guide hasn’t been updated in 2024. Prices and travel guidelines may no longer be accurate so it’s important that you verify any information before proceeding. I knew next to nothing about Yogyakarta before this trip. All I knew was that it’s the base for Borobudur, and that the name Yogyakarta was often spelled and pronounced Jogjakarta (or Yogya and Jogja for short). That was it. I didn’t even know Prambanan existed until I started doing research for this trip. But one thing I’ve learned about travel, is that the places you…

Read More

Clear Web vs. Deep Web vs. Dark Web Threat intelligence specialists divide the Internet into three main components: Clear Web – Web resources that can be viewed through public search engines, including media, blogs and other pages and sites. Deep web – Websites and forums not indexed by search engines. For example, webmail, online banking, corporate intranets, walled gardens, etc. Some of the hacker forums exist in the Deep Web that require login credentials. Dark Web – Web resources that require special software to access. These sources are anonymous and private and include invitation-only Telegram groups and forums. The Dark…

Read More