
Dr. Remedios S. Flamiano with her trophies after her Greenlands Agritech Ventures, DOST XII entry, won the national Best SETUP Adoptor Award in the DOST National Science and Technology Week (NSTW) on […]
Dr. Remedios S. Flamiano with her trophies after her Greenlands Agritech Ventures, DOST XII entry, won the national Best SETUP Adoptor Award in the DOST National Science and Technology Week (NSTW) on […]
(Image by Sasin Tipchai/Pixabay) While critical industries such as the financial sector have embraced and invested heavily in information security, the hospitality industry has been left wide open for cybercriminals. Credit card information, […]
(Image by Pete Linfort / Pixabay) Security researchers of Fortinet recently discovered a malicious document that is suspected to be targeting the Philippines using a Microsoft Office code. The document is named […]
(Image by Gerald Altman/Pixabay) While Asean has almost doubled its AI (artificial intelligence) adoption from 8 percent in 2017 to 14 percent this year, many organizations are not showing any urgency to […]
In photo:Â CEZA Senior Deputy administrator Raymundo Roquero (left) seals a deal with a handshake with Hong Kong-based GMQ represented by its legal representative Ricky Law on July 10. (Edd K. Usman) By […]
About 21 million users have been affected by the Timehop data breach that happened on July 4. The digital nostalgia app that collects photos from across all social media platforms as well […]
(Image from Pixabay) Five government agencies will soon launch a draft joint administrative order (JAO) to deal with consumer complaints involving telco services. Each of the agency will handle a specific complaint […]
(Image by Prayad Kosasaeng/Pixabay) Google has rolled out the Android Security Patch for July 2018 including the 2018-07-01 and 2018-07-05 and is now available worldwide, at least for Pixel and Nexus users. The […]
(Image by Emilian Vicol/Pixabay) Globe Telecom has taken a step forward to fulfill its plans to divest its tower assets. This is in line with the company’s thrust to continuously improve internet connectivity […]
(Image by Monoar Rahman Rony/Pixabay) Microsoft has long disabled macros to avoid possible security risks but cybercriminals have found a way to utilize them in deploying payloads in user desktop systems. A macro […]
(Above image by Serena Wong/Pixabay) IDC Asia/Pacific named recently the 19 out of 148 most outstanding smart city projects in the Asia-Pacific excluding Japan (APeJ) for the 2018 IDC Smart City Asia […]
While the “exposĂ©” The Wall Street Journal published on July 2 may not come as a surprise to the technology buff, it is still upsetting for ordinary email users to learn that […]
Network and endpoint security firm Sophos announced recently the findings of its survey, “The State of Endpoint Security Today,” which shows the extent to which businesses are at risk of repeated ransomware […]
(Image by Gerald Altmann/Pixabay) Trend Micro recently ran a survey on Twitter asking people how they feel about their data on social media. The results are almost split because people have different […]
By Edd K. Usman Upstart startups would certainly learn a few lessons about digital disruption, that being at the top may sometimes mean a temporary place. That being at the peak could […]
(Image from Pixabay) A team of security researchers discovered a new vulnerability that would likely affect every Android phone — and even tablets — released after 2012. The vulnerability is dubbed as […]
By Edd K. Usman Without a shred of doubt, every one of the many thousands who crammed every day the 109 coaches of the Light Rail Transit (LRT)-1 wants to have a […]
(Screencap from NameTests website) When it rains, it pours. Facebook is still recovering from the massive crisis brought by the Cambridge Analytica scandal and yet another data leak exposĂ© is hounding the […]
(Image from Pixabay) In developing countries, consumers don’t have much choice but to buy the most affordable smartphone. As long as the camera is good and it works well, that is fine […]
(Image by Mudassar Iqbal/Pixabay) According to the latest IDC Asia / Pacific, excluding Japan (APeJ) Semiannual Services Tracker, total outsourcing services revenues in the Philippines exceeded US$300 million for the full-year 2017, with 8.2 […]
(Image by Gerd Altman/Pixabay) Now that businesses have fully embraced digital transformation by moving their data to the cloud, they are now faced with the gargantuan task of protecting information from cybercriminals. […]
PLDT and Smart Communications chief executive officer Manuel V. Pangilinan was named Telecom CEO of the Year at the Telecom Asia Awards ceremony held on June 26 in Singapore. “I accept this […]
(Image by Pete Linforth / Pixabay) Ransomware incidents have significantly dropped in the first half of 2018 while the increasing popularity of cryptocurrency gave criminals a new target, according to McAfee’s quarterly […]
The excitement over World Cup 2018 is building up as the finals are getting nearer and nearer. Fans and new converts flock to social media to show support for their favorite teams […]
Online gamers have been lured to reveal personal details in exchange for gaming currencies and a promise of free premium upgrades, according to Action Fraud, UK’s national reporting center for fraud and […]
(Image from Pixabay) Smart cities and digital transformation will drive the Internet of Things (IoT) spending worldwide and may reach $1.2 trillion in 2022. This is the latest forecast of technology industry […]
Amid preparations for the coming of 5G technology in the country, PLDT wireless subsidiary Smart Communications Inc. (Smart) and technology partner Huawei Technologies Phils. Inc. have successfully breached 5G speeds of over […]
Image by Wynn Pointaux (Pixabay) Globe Business, the Information and Communications Technology (ICT) arm of Globe Telecom, brings out a selection of tools and solutions that will enable enterprises to build and secure […]
Image by Gerd Altmann (Pixabay) Security firm TrendMicro reveals that after a series of research, it found network attacks that target a vulnerability in the Drupal content management framework. The attacks seem to […]
Image from Deep Instinct /Â Security firm Deep Instinct recently uncovered a new malware that uses a more deceptive approach and then converts PCs to practically the hackers’ botnet. Mylobot also gives […]
You must be logged in to post a comment.