
Dr. Remedios S. Flamiano with her trophies after her Greenlands Agritech Ventures, DOST XII entry, won the national Best SETUP Adoptor Award in the DOST National Science and Technology Week (NSTW) on […]
Marlet Salazar is a technology writer with 20 years of experience in the media industry.
T: @marletds
LinkedIn: /marletsalazar/
Dr. Remedios S. Flamiano with her trophies after her Greenlands Agritech Ventures, DOST XII entry, won the national Best SETUP Adoptor Award in the DOST National Science and Technology Week (NSTW) on […]
(Image by Sasin Tipchai/Pixabay) While critical industries such as the financial sector have embraced and invested heavily in information security, the hospitality industry has been left wide open for cybercriminals. Credit card information, […]
(Image by Pete Linfort / Pixabay) Security researchers of Fortinet recently discovered a malicious document that is suspected to be targeting the Philippines using a Microsoft Office code. The document is named […]
(Image by Gerald Altman/Pixabay) While Asean has almost doubled its AI (artificial intelligence) adoption from 8 percent in 2017 to 14 percent this year, many organizations are not showing any urgency to […]
In photo: CEZA Senior Deputy administrator Raymundo Roquero (left) seals a deal with a handshake with Hong Kong-based GMQ represented by its legal representative Ricky Law on July 10. (Edd K. Usman) By […]
About 21 million users have been affected by the Timehop data breach that happened on July 4. The digital nostalgia app that collects photos from across all social media platforms as well […]
(Image from Pixabay) Five government agencies will soon launch a draft joint administrative order (JAO) to deal with consumer complaints involving telco services. Each of the agency will handle a specific complaint […]
(Image by Prayad Kosasaeng/Pixabay) Google has rolled out the Android Security Patch for July 2018 including the 2018-07-01 and 2018-07-05 and is now available worldwide, at least for Pixel and Nexus users. The […]
(Image by Emilian Vicol/Pixabay) Globe Telecom has taken a step forward to fulfill its plans to divest its tower assets. This is in line with the company’s thrust to continuously improve internet connectivity […]
(Image by Monoar Rahman Rony/Pixabay) Microsoft has long disabled macros to avoid possible security risks but cybercriminals have found a way to utilize them in deploying payloads in user desktop systems. A macro […]
(Above image by Serena Wong/Pixabay) IDC Asia/Pacific named recently the 19 out of 148 most outstanding smart city projects in the Asia-Pacific excluding Japan (APeJ) for the 2018 IDC Smart City Asia […]
While the “exposé” The Wall Street Journal published on July 2 may not come as a surprise to the technology buff, it is still upsetting for ordinary email users to learn that […]
Network and endpoint security firm Sophos announced recently the findings of its survey, “The State of Endpoint Security Today,” which shows the extent to which businesses are at risk of repeated ransomware […]
(Image by Gerald Altmann/Pixabay) Trend Micro recently ran a survey on Twitter asking people how they feel about their data on social media. The results are almost split because people have different […]
By Edd K. Usman Upstart startups would certainly learn a few lessons about digital disruption, that being at the top may sometimes mean a temporary place. That being at the peak could […]
(Image from Pixabay) A team of security researchers discovered a new vulnerability that would likely affect every Android phone — and even tablets — released after 2012. The vulnerability is dubbed as […]
By Edd K. Usman Without a shred of doubt, every one of the many thousands who crammed every day the 109 coaches of the Light Rail Transit (LRT)-1 wants to have a […]
(Screencap from NameTests website) When it rains, it pours. Facebook is still recovering from the massive crisis brought by the Cambridge Analytica scandal and yet another data leak exposé is hounding the […]
(Image from Pixabay) In developing countries, consumers don’t have much choice but to buy the most affordable smartphone. As long as the camera is good and it works well, that is fine […]
(Image by Mudassar Iqbal/Pixabay) According to the latest IDC Asia / Pacific, excluding Japan (APeJ) Semiannual Services Tracker, total outsourcing services revenues in the Philippines exceeded US$300 million for the full-year 2017, with 8.2 […]
(Image by Gerd Altman/Pixabay) Now that businesses have fully embraced digital transformation by moving their data to the cloud, they are now faced with the gargantuan task of protecting information from cybercriminals. […]
(Image by Pete Linforth / Pixabay) Ransomware incidents have significantly dropped in the first half of 2018 while the increasing popularity of cryptocurrency gave criminals a new target, according to McAfee’s quarterly […]
Online gamers have been lured to reveal personal details in exchange for gaming currencies and a promise of free premium upgrades, according to Action Fraud, UK’s national reporting center for fraud and […]
(Image from Pixabay) Smart cities and digital transformation will drive the Internet of Things (IoT) spending worldwide and may reach $1.2 trillion in 2022. This is the latest forecast of technology industry […]
Image by Gerd Altmann (Pixabay) Security firm TrendMicro reveals that after a series of research, it found network attacks that target a vulnerability in the Drupal content management framework. The attacks seem to […]
Image from Deep Instinct / Security firm Deep Instinct recently uncovered a new malware that uses a more deceptive approach and then converts PCs to practically the hackers’ botnet. Mylobot also gives […]
Image from Ericsson Press Center / In the Philippines, the two telecommunications company have already announced their 5G (fifth generation) technology rollouts recently and almost simultaneously. This is in anticipation of the […]
Photo by Florante Valdez / Pixabay Bangko Sentral ng Pilipinas warns financial institutions of cyberattack threats that can not only compromise user data but may also cripple operations. Reports of data breaches […]
Image by Robinraj Premchand / Pixabay / North Korea is allegedly conducting another malware operation, according to the Malware Analysis Report released by the United States Department of Homeland Security’s Computer Emergency Response […]
Photo by William Iven / Pixabay / In the next software update, iPhones will shut down the security gap that allows a third party to break in and collect data even without a […]
You must be logged in to post a comment.