ONE great thing about living in a thriving digital age is having a multitude of helpful and nifty apps do useful things for us at a flick of our fingers. However, though these apps might be free, it’s highly likely that they are monetizing app...
In 2015, American news network CBS Miami published an interview with Greg Hanis, a former black hat hacker, who explained how hackers operate and gave insights on how hackers think. This story has been rewritten based on the article...
The simplest definition of data privacy is that it is the branch of data security concerned about the proper handling of data. Whether or not you consent to give your data when it is requested of you, how this data is stored and protected, how you...
As a country with a large population of heavy Internet users, cashless mobile systems are quickly becoming the trend. Online banking is one way to maximize this digital space - cash transfers, online shopping payments, and other transactions can be...
From 2013 to 2015, over 1,200 cyber crimes were reported to the Philippine National Police Anti-Cybercrime Group (PNP ACG). Of these, 127 (or around 10%) were complaints about cyber identity theft. Cyber identity theft happens when a victim’s...