From November 2017 through the end of June 2018, Akamai researcher analysis shows more than 30 billion malicious login attempts during the eight-month period
Acer Security Suite is a complete hardware and software package that encrypts any program file, computer, and user-set passwords and can leverage the trusted platform module technology for secure computing.
Using application-based 2FA such as Sophos Authenticator mitigates a lot of the risk because these mobile authentication apps don’t rely on communications tied to phone numbers.
The most valuable technology companies are expecting a tumultuous year in terms of data breaches. Google said it is closing its consumer social networking site Google+ after personal data of 500,000 users […]
Filipinos affected by Facebook security breach ‘yet to be determined,’ says National Privacy Commission
Image from Pixabay Many Facebook users in the Philippines have been logged out of their accounts sometime the past week. While unusual, some took it as just another routine account and password […]
Image from NPC Twitter account Commissioner Raymund Liboro of the National Privacy Commission recently revealed the government’s plan to tap the assistance white-hat or ethical hackers to help secure the Philippine Identification […]
The majority of modern nations implement a national ID system to achieve greater efficiency in the provision of services. Many of these nations, however, continue to struggle with the competing interest of […]
(Image from ABS-CBN PR website) Technology news website ZDNet reported on a possible data breach affecting customers of ABS-CBN online store. ZDNet quoted Dutch security researcher Willem “gwillem” de Groot that a […]
(Image from Pixabay) Cybercriminals won’t discriminate on the size of an organization as long as they could obtain data and other information they could use for their crimes. Small and medium enterprises […]
(Image from Pixabay) Device-to-cloud cybersecurity company McAfee announced recently results from its latest survey, The Age of Consent, and found 30 percent of parents post a photo or video of their child […]
In its recent article, Cybersecurity of the Philippines-CERT (CSP-CERT) illustrates how sextortion scams happen with victims often left helpless and opt to just give in to the criminal’s demand. In CSP-CERT’s explanation, […]
(Image by Pete Linforth/Pixabay) Worldwide spending on information security products and services will reach more than $114 billion in 2018, an increase of 12.4 percent from last year, according to the latest […]
(Image by Gerald Altman/Pixabay) The wave of cyber attacks does not match the number of information security officers (infosec) needed to respond to the crimes. There are more high-profile data breaches reported […]
(Image by Darwin Laganzon/Pixabay) Recent data breaches, not only in the private sector but in the government as well, raised cybersecurity awareness in the Philippines. While the conversation is still limited to […]
(Image by Sasin Tipchai/Pixabay) While critical industries such as the financial sector have embraced and invested heavily in information security, the hospitality industry has been left wide open for cybercriminals. Credit card information, […]