ACCORDING to DigitalCare.com, your social media habits need to meet a set of criteria for your accounts to be considered secure. If you can check all the items below, great! You’re probably more secure than most, although there is no telling what...
From 2013 to 2015, over 1,200 cyber crimes were reported to the Philippine National Police Anti-Cybercrime Group (PNP ACG). Of these, 127 (or around 10%) were complaints about cyber identity theft. Cyber identity theft happens when a victim’s...
Among existing insurance products, cyber insurance is a lesser known type of policy, since it only began to exist after the Internet boomed in the early 2000s. It began gaining traction in 2005, which makes it much newer than its more ubiquitous...
In 2015, American news network CBS Miami published an interview with Greg Hanis, a former black hat hacker, who explained how hackers operate and gave insights on how hackers think. This story has been rewritten based on the article...
The simplest definition of data privacy is that it is the branch of data security concerned about the proper handling of data. Whether or not you consent to give your data when it is requested of you, how this data is stored and protected, how you...