Category: Tech

Post

Pinoy hackers with terror links arrested

MANILA — A joint team of Philippine National Police and the U.S. Federal Bureau of Investigation has arrested a group of Filipino computer hackers with alleged connection to the Southeast Asian terror group Jemaah Islamiyah. The PNP-Criminal Investigation and Detection Group (PNP-CIDG) named Thursday those arrested as Macnell Gracilla, 31, Francisco Mañalac, 25, Regina Balura,...

Post

Hackers attack Facebook

Facebook users yesterday complained of blasphemy, indecency and violence that have flooded the news feed feature of the social network. Graphic images included religious icons in sexual scenarios, children who appear to be victims of violence, or half-naked women. Members report these images have been “liked” by them without their permission or knowledge. Some have...

Post
Murder in the family: The Unkindest Cut of All

Murder in the family: The Unkindest Cut of All

We live in a world that is getting more and more complicated. Breakthroughs in technology enable us to do a lot of things, which we haven’t imagined possible before. Innovation has pushed people to come up with inventions to help us deal with the times. More significantly, relationships have also evolved. Because of the Internet...

Post
Managing Campus Security: Everybody’s Concern

Managing Campus Security: Everybody’s Concern

Many schools face different threats. These include illegal drugs, kidnapping, physical injury, extortion, and theft. Hazing among fraternities can lead to tragic consequences. Presence of gangs can create trouble and inflict harm to the students.

Post
Security: The Next Generation Career

Security: The Next Generation Career

Like any other jobs, security uses an organized learning process to adopt to the ever-changing trends. Security management or its related fields provides a stable pathway for those who want to explore the opportunities in the security industry.

Post
Protect your Child from Lurking Web Risks

Protect your Child from Lurking Web Risks

Online predators are waiting for the right victim to log on. They befriend unassuming children, talk about school and friends, or the same TV program, music, or movies. They pretend as teenagers from nearby schools “phishing” for personal information. In some cases, these predators ask their victims to meet them in person.

Post
Bridging Physical-Logical Security Gaps

Bridging Physical-Logical Security Gaps

With the rapid growth of information technology, security professionals have two options: evolve or dissolve. To stay relevant in an organization, one must update himself by reading books like the sixth edition of the Information Security Management Handbook addressing up-to-date issues in physical and logical security and business continuity.

Post
Corporate Mind Barriers to Business Continuity

Corporate Mind Barriers to Business Continuity

Enterprises recognize the need to develop a business continuity plan by virtue of government legislation, insurance requirements, and the threat of litigation from third parties. In the US, BCP initiatives were in response to the business losses and a reaction to many high-profile corporate accounting scandals, including Enron and WorldCom.