In 2015, American news network CBS Miami published an interview with Greg Hanis, a former black hat hacker, who explained how hackers operate and gave insights on how hackers think. This story has been rewritten based on the article...
As the saying goes, there is no such thing as a free lunch. While of course this saying shouldn’t be taken literally, it simply reminds us of the reality that usually, when someone offers something for “free”, there is usually a...
Among existing insurance products, cyber insurance is a lesser known type of policy, since it only began to exist after the Internet boomed in the early 2000s. It began gaining traction in 2005, which makes it much newer than its more ubiquitous...
From 2013 to 2015, over 1,200 cyber crimes were reported to the Philippine National Police Anti-Cybercrime Group (PNP ACG). Of these, 127 (or around 10%) were complaints about cyber identity theft. Cyber identity theft happens when a victim’s...
Last July 2019, beauty retailer Sephora became a victim of a major data breach - which affected its customers in the Philippines. While this is especially concerning for local make-up lovers whose stolen data included their names, email addresses,...