‘Love to Lab’ wins DOST’s 2018 national ‘Best SETUP Adoptor’ Competition
Dr. Remedios S. Flamiano with her trophies after her Greenlands Agritech Ventures, DOST XII entry, won the national Best SETUP Adoptor Award in the DOST National Science and Technology Week…
Onslaught of botnets hounds hospitality industry — Akamai
(Image by Sasin Tipchai/Pixabay) While critical industries such as the financial sector have embraced and invested heavily in information security, the hospitality industry has been left wide open for cybercriminals.…
Hussarini backdoor might be targeting the Philippines — Fortinet researchers
(Image by Pete Linfort / Pixabay) Security researchers of Fortinet recently discovered a malicious document that is suspected to be targeting the Philippines using a Microsoft Office code. The document…
Lack of skills, knowledge, costs cited as barriers to AI adoption in Asean region
(Image by Gerald Altman/Pixabay) While Asean has almost doubled its AI (artificial intelligence) adoption from 8 percent in 2017 to 14 percent this year, many organizations are not showing any…
CEZA off to a successful start on setting up Fintech Hub in PH
In photo: CEZA Senior Deputy administrator Raymundo Roquero (left) seals a deal with a handshake with Hong Kong-based GMQ represented by its legal representative Ricky Law on July 10. (Edd…
Data breach affects 21 million Timehop users
About 21 million users have been affected by the Timehop data breach that happened on July 4. The digital nostalgia app that collects photos from across all social media platforms…
Gov’t agencies to handle consumer complaints involving telco services
(Image from Pixabay) Five government agencies will soon launch a draft joint administrative order (JAO) to deal with consumer complaints involving telco services. Each of the agency will handle a…
Android users urged to update to security patch level for July 2018 to address vulnerabilities
(Image by Prayad Kosasaeng/Pixabay) Google has rolled out the Android Security Patch for July 2018 including the 2018-07-01 and 2018-07-05 and is now available worldwide, at least for Pixel and…
Globe Telecom sets up new company for tower assets
(Image by Emilian Vicol/Pixabay) Globe Telecom has taken a step forward to fulfill its plans to divest its tower assets. This is in line with the company’s thrust to continuously…
Actors use ‘macros’ to target desktop shortcuts and install malware payloads
(Image by Monoar Rahman Rony/Pixabay) Microsoft has long disabled macros to avoid possible security risks but cybercriminals have found a way to utilize them in deploying payloads in user desktop…
IDC names the Top 19 Smart City Projects in Asia-Pacific for 2018
(Above image by Serena Wong/Pixabay) IDC Asia/Pacific named recently the 19 out of 148 most outstanding smart city projects in the Asia-Pacific excluding Japan (APeJ) for the 2018 IDC Smart…
Gmail snoops: Third-party developers read users’ emails
While the “exposé” The Wall Street Journal published on July 2 may not come as a surprise to the technology buff, it is still upsetting for ordinary email users to…
Inadequate protection against ransomware makes enterprises vulnerable to attacks
Network and endpoint security firm Sophos announced recently the findings of its survey, “The State of Endpoint Security Today,” which shows the extent to which businesses are at risk of…
Can users help in securing the safety of their data on social media?
(Image by Gerald Altmann/Pixabay) Trend Micro recently ran a survey on Twitter asking people how they feel about their data on social media. The results are almost split because people…
IBM: ‘Incumbents’ reclaim throne in digital disruption from startups
By Edd K. Usman Upstart startups would certainly learn a few lessons about digital disruption, that being at the top may sometimes mean a temporary place. That being at the…
Android RAMpage vulnerability could wipe out smartphone memory
(Image from Pixabay) A team of security researchers discovered a new vulnerability that would likely affect every Android phone — and even tablets — released after 2012. The vulnerability is…
LRMC invites public to join Hackatren to improve LRT-1 customer experience
By Edd K. Usman Without a shred of doubt, every one of the many thousands who crammed every day the 109 coaches of the Light Rail Transit (LRT)-1 wants to…
Facebook quiz leaked data of 120 million users over the years
(Screencap from NameTests website) When it rains, it pours. Facebook is still recovering from the massive crisis brought by the Cambridge Analytica scandal and yet another data leak exposé is…
Cheap Android phones come with freebies that users won’t like — Kaspersky
(Image from Pixabay) In developing countries, consumers don’t have much choice but to buy the most affordable smartphone. As long as the camera is good and it works well, that…
IDC: Growing preference for cloud services to affect IT outsourcing market in the Philippines
(Image by Mudassar Iqbal/Pixabay) According to the latest IDC Asia / Pacific, excluding Japan (APeJ) Semiannual Services Tracker, total outsourcing services revenues in the Philippines exceeded US$300 million for the…
Know how to respond to cyber attacks, enterprises told
(Image by Gerd Altman/Pixabay) Now that businesses have fully embraced digital transformation by moving their data to the cloud, they are now faced with the gargantuan task of protecting information…
MVP is Telecom Asia’s CEO of the Year
PLDT and Smart Communications chief executive officer Manuel V. Pangilinan was named Telecom CEO of the Year at the Telecom Asia Awards ceremony held on June 26 in Singapore. “I…
Coin mining malware surpasses ransomware attacks — McAfee
(Image by Pete Linforth / Pixabay) Ransomware incidents have significantly dropped in the first half of 2018 while the increasing popularity of cryptocurrency gave criminals a new target, according to…
Watch World Cup securely; Sophos offers free anti-virus software
The excitement over World Cup 2018 is building up as the finals are getting nearer and nearer. Fans and new converts flock to social media to show support for their…
Fortnite, Steam Card gamers fall for fraudsters’ schemes
Online gamers have been lured to reveal personal details in exchange for gaming currencies and a promise of free premium upgrades, according to Action Fraud, UK’s national reporting center for…
IoT worldwide spending to reach $1.2 trillion in 2022, says IDC
(Image from Pixabay) Smart cities and digital transformation will drive the Internet of Things (IoT) spending worldwide and may reach $1.2 trillion in 2022. This is the latest forecast of…
Smart notches 5G speeds of over 14Gbps
Amid preparations for the coming of 5G technology in the country, PLDT wireless subsidiary Smart Communications Inc. (Smart) and technology partner Huawei Technologies Phils. Inc. have successfully breached 5G speeds…
Cloud, Cybersecurity Take Center Stage at ‘Breakthrough with Globe Business Solutions’
Image by Wynn Pointaux (Pixabay) Globe Business, the Information and Communications Technology (ICT) arm of Globe Telecom, brings out a selection of tools and solutions that will enable enterprises to…
Monero-mining malware deployed through Drupal security flaw
Image by Gerd Altmann (Pixabay) Security firm TrendMicro reveals that after a series of research, it found network attacks that target a vulnerability in the Drupal content management framework. The…
Windows malware sleeps for days then deploys additional payloads
Image from Deep Instinct / Security firm Deep Instinct recently uncovered a new malware that uses a more deceptive approach and then converts PCs to practically the hackers’ botnet. Mylobot…
You must be logged in to post a comment.