Apple is now the world’s $1-trillion company
(Image from Pixabay) At the closing of the stock market Thursday (US time), Apple Inc.’s stock price leaped to 2.9 percent at $207.39 which led to it becoming the first…
Technology News
(Image from Pixabay) At the closing of the stock market Thursday (US time), Apple Inc.’s stock price leaped to 2.9 percent at $207.39 which led to it becoming the first…
(Image by Gerald Altman/Pixabay) The worldwide infrastructure as a service (IaaS) market grew 29.5 percent in 2017 to total $23.5 billion, up from $18.2 billion in 2016, according to Gartner…
According to preliminary data from the International Data Corporation (IDC) Worldwide Quarterly Mobile Phone Tracker, smartphone vendors shipped a total of 342 million units during the second quarter of 2018…
(Image by Pete Linfort/Pixabay) Despite high-profile cyber attacks and massive data breaches happening recently, organizations don’t see the need to have cybersecurity experts onboard. Industry research firm Gartner finds that…
Secretary Raul Lambino (third from right) seals with a handshake CEZA’s collaboration with Hong Kong-based Apsaras Group Ltd. through its chair Jian Li. In the frame is the Principal Provisional…
In a media advisory released Friday, Globe Telecom said it is on track on the planned deployment of 5G technology in the second quarter of 2019. A few weeks ago,…
(Image by Pete Linforth/Pixabay) Even cybercriminals upgrade or upcycle ransomware as evidenced by Jigsaw that has reemerged to target the cryptocurrency industry. The ransomware is now known as BitcoinStealer and…
(Image by Darwin Laganzon/Pixabay) Recent data breaches, not only in the private sector but in the government as well, raised cybersecurity awareness in the Philippines. While the conversation is still…
(Image from Pixabay) The internet has exploded into a mammoth universe for humanity, and technology organizations scrambled to become part of it. In the process, telecommunications companies expanded their infrastructure…
Calisto, a version of the Mac malware called Proton, was discovered only recently but has been around for two years. Security experts say it is already dead at this point…
By Edd K. Usman Deep-diving into blockchain technology and cryptocurrency, the Cagayan Economic Zone Authority (CEZA) is planning to issue its own “token” or crypto coin. The planned release of…
(Image from Pixabay) Singapore Prime Minister Lee Hsien Loong is among the 1.5 million patients of SingHealth, whose non-medical data were compromised in a cyber attack that was detected on…
(Image by Pete Linforth/Pixabay) One of the longest-running exploits called Magnitude has been upgraded to target more countries in the Asia-Pacific, according to the blog post of Malwarebytes. Magniber, the…
Dr. Remedios S. Flamiano with her trophies after her Greenlands Agritech Ventures, DOST XII entry, won the national Best SETUP Adoptor Award in the DOST National Science and Technology Week…
(Image by Sasin Tipchai/Pixabay) While critical industries such as the financial sector have embraced and invested heavily in information security, the hospitality industry has been left wide open for cybercriminals.…
(Image by Pete Linfort / Pixabay) Security researchers of Fortinet recently discovered a malicious document that is suspected to be targeting the Philippines using a Microsoft Office code. The document…
(Image by Gerald Altman/Pixabay) While Asean has almost doubled its AI (artificial intelligence) adoption from 8 percent in 2017 to 14 percent this year, many organizations are not showing any…
In photo: CEZA Senior Deputy administrator Raymundo Roquero (left) seals a deal with a handshake with Hong Kong-based GMQ represented by its legal representative Ricky Law on July 10. (Edd…
About 21 million users have been affected by the Timehop data breach that happened on July 4. The digital nostalgia app that collects photos from across all social media platforms…
(Image by Prayad Kosasaeng/Pixabay) Google has rolled out the Android Security Patch for July 2018 including the 2018-07-01 and 2018-07-05 and is now available worldwide, at least for Pixel and…
(Image by Monoar Rahman Rony/Pixabay) Microsoft has long disabled macros to avoid possible security risks but cybercriminals have found a way to utilize them in deploying payloads in user desktop…
While the “exposé” The Wall Street Journal published on July 2 may not come as a surprise to the technology buff, it is still upsetting for ordinary email users to…
By Edd K. Usman Upstart startups would certainly learn a few lessons about digital disruption, that being at the top may sometimes mean a temporary place. That being at the…
(Image from Pixabay) A team of security researchers discovered a new vulnerability that would likely affect every Android phone — and even tablets — released after 2012. The vulnerability is…
By Edd K. Usman Without a shred of doubt, every one of the many thousands who crammed every day the 109 coaches of the Light Rail Transit (LRT)-1 wants to…
(Screencap from NameTests website) When it rains, it pours. Facebook is still recovering from the massive crisis brought by the Cambridge Analytica scandal and yet another data leak exposé is…
(Image from Pixabay) In developing countries, consumers don’t have much choice but to buy the most affordable smartphone. As long as the camera is good and it works well, that…
(Image by Mudassar Iqbal/Pixabay) According to the latest IDC Asia / Pacific, excluding Japan (APeJ) Semiannual Services Tracker, total outsourcing services revenues in the Philippines exceeded US$300 million for the…
(Image by Pete Linforth / Pixabay) Ransomware incidents have significantly dropped in the first half of 2018 while the increasing popularity of cryptocurrency gave criminals a new target, according to…
Online gamers have been lured to reveal personal details in exchange for gaming currencies and a promise of free premium upgrades, according to Action Fraud, UK’s national reporting center for…
You must be logged in to post a comment.