Category: Tech

Post
Protect yourself from WannaCry malware

Protect yourself from WannaCry malware

Heads up! The WannaCry or Wanna Decryptor is a sophisticated ransomware that exploits a vulnerability in Microsoft’s Windows Operating System. It is believed that this ransomware is spread through phishing emails, malicious advertisements on websites, and questionable apps and programs. The infographic below gives an overview of the things you must watch out for, as...

Post

5 Ways to Protect Yourself from Online Payment Fraud

The convenience of online shopping offers is hard to resist. In fact Filipinos tops the list of online shoppers in a recent survey conducted by Nielsen in 2012. But when closing a deal online, the number says otherwise, pointing security as the main concern. With just a few clicks your shopping is done and you just need to...

Post

Information Technology for Good Governance: Transparency to Curb Corruption

With various scandals involving government agencies, such as the recent pork barrel scam, it’s high time we turn to information technology solutions to help promote transparency and curb corruption all at the same time. The national government recently launched an open data portal and cashless transaction program on its efforts to fend off graft and...

Post

4 Things Banks Need to Know about DDoS Attacks

To cope with an increased number of large distributed denial of service attacks, banks must not only have plans in place – they should consider a broad set of defensive tools that combine on-premise technologies and cloud-based scrubbing services. Financial institutions have been battling waves of large distributed denial of service (DDoS) attacks since early...

Post

Cyber War Replaces Cold War

At the SecureAsia@Manila convention held at the Makati Shangri-La Hotel last September, W. Hord Tipton, Executive Director of the International Information Security Systems Certification Consortium, or (ISC)2, had figured in several talks debating whether we are in a state of cyber war. “My position is:  you need to wake up,” says Tipton. “When I see...

Post

(ISC)² Top Executive Underscores Software, Supply Chain, and Cloud Services Security at Major Regional Conference

At the SecureAsia@Manila 2013 conference, (ISC)2 Executive Director W. Hord Tipton underscores the need for software and supply chain security, and holds cloud services as a good option for acquiring the use of systems built and managed with competent information security and relevant best practices. SecureAsia@Manila 2013–eighth in the annual SecureAsia conferences co-organized since 2006...

Post

79 Percent of Businesses Experienced a Mobile Security Incident in the Past Year

Mobile Security Incidents Cost More Than US$100,000 for Almost Half of Businesses Surveyed Singapore, June 6, 2013 – Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today published its second mobile security report, revealing the majority of businesses (79%) had a mobile security incident in the past year, and...

Post

Trend Micro and INTERPOL Collaborate in Global Fight against Cybercrime

Trend Micro Inc. has announced last June 24, 2013 its collaboration with INTERPOL, the world’s largest international police organization with 190 member countries, to support global law enforcement programs against cybercrime. Today’s cyber threats are increasingly becoming more targeted and sophisticated with criminal networks operating across the world, coordinating complex attacks against targets in a...