Acer Security Suite is a complete hardware and software package that encrypts any program file, computer, and user-set passwords and can leverage the trusted platform module technology for secure computing.
Using application-based 2FA such as Sophos Authenticator mitigates a lot of the risk because these mobile authentication apps don’t rely on communications tied to phone numbers.
The most valuable technology companies are expecting a tumultuous year in terms of data breaches. Google said it is closing its consumer social networking site
Joseph Felix Pacamarra, co-founder and chief strategy officer of Cybersecurity of the Philippines-Computer Emergency Response Team (CSP-CERT), was just 19 years old when he realized
Image from Pixabay Many Facebook users in the Philippines have been logged out of their accounts sometime the past week. While unusual, some took it
(Image from Pixabay) In a blog post, Facebook says 50 million of its 2.23 billion active users have been affected by a reported security breach.
Image from NPC Twitter account Commissioner Raymund Liboro of the National Privacy Commission recently revealed the government’s plan to tap the assistance white-hat or ethical
Image from Pixabay In the McAfee Threats Report for September 2018, security researchers highlight the surge of crypto mining malware that started last year and
The majority of modern nations implement a national ID system to achieve greater efficiency in the provision of services. Many of these nations, however, continue
Image from Pixabay According to the Kaspersky Lab IoT report, in the first half of 2018, IoT devices were attacked with more than 120,000 modifications
(Image from ABS-CBN PR website) Technology news website ZDNet reported on a possible data breach affecting customers of ABS-CBN online store. ZDNet quoted Dutch security
(Image by Pete Linforth/Pixabay) The average DDoS (distributed denial of service) attack quintupled in size to more than 26 Gbps and the maximum attack size
(Image from Pixabay) The Kaspersky Lab Global Research and Analysis Team (GReAT) has discovered several infections from a previously unknown Trojan, which is most likely
(Image from Pixabay) Cybersecurity and defense company Trend Micro discovered recently a spam campaign that targets emails that are connected with banks. The malware downloader
(Image from Pixabay) Cybercriminals won’t discriminate on the size of an organization as long as they could obtain data and other information they could use
(Image from Pixabay) Device-to-cloud cybersecurity company McAfee announced recently results from its latest survey, The Age of Consent, and found 30 percent of parents post
(Image from Pixabay) Kaspersky Lab researchers have published a report on botnet activity in the first half of 2018, analyzing more than 150 malware families
In a Gartner report published in July, it says that only 65 percent of organizations have cybersecurity experts in spite of the increasing number of
In its recent article, Cybersecurity of the Philippines-CERT (CSP-CERT) illustrates how sextortion scams happen with victims often left helpless and opt to just give in
(Image by Darwin Laganzon/Pixabay) In its Midyear Security Roundup 2018, cybersecurity firm Trend Micro finds out that cybercriminals now prefer to work stealthily for a
(Image from Pixabay) Cybersecurity firm Symantec Corp. has announced significant enhancements to Symantec Management Center, the centralized solution that manages the network portfolio inside of
(Image by Gerald Altmann/Pixabay) Kaspersky Lab researchers have published a report on botnet activity in the first half of 2018, analyzing more than 150 malware
(Image from Pixabay) Instagram (IG) is one of the most popular social networking sites today with one billion monthly users. With the sheer number of
(Image by Pete Linforth/Pixabay) Worldwide spending on information security products and services will reach more than $114 billion in 2018, an increase of 12.4 percent
Online quizzes or personality games that appear on your social network feeds are boredom busters and sometimes fun to play. They entertain you with just
(Image from Pixabay) A security researcher MalwareHunterTeam discovered a new variant of Matrix Ransomware that can rename encrypted files, according to the report by BleepingComputer.
In the second quarter of 2018, Kaspersky Lab’s anti-phishing technologies prevented over 107 million attempts to visit phishing pages, of which 35.7 percent were related
(Image by Bethany Drouin/Pixabay) Cloud computing ranks as the top risk concern for executives in risk, audit, finance and compliance, according to the latest survey
(Image by Gerald Altman/Pixabay) The wave of cyber attacks does not match the number of information security officers (infosec) needed to respond to the crimes.
(Image from F5Labs) Data breaches continue to be a threat to enterprises and consumers, especially in the wake of recent events across the region, such