FROM BEEPERS TO BYTES The increasing prevalence of task scams targeting unsuspecting Filipinos seeking employment is alarming. These scams have become a significant concern as they exploit the desperation and hope of job seekers. Investigations have traced these fraudulent activities to illegal...
FROM BEEPERS TO BYTES I am currently in Taiwan, attending the annual Computex Taipei event, one of the most anticipated technology exhibitions in the world. Computex Taipei is renowned for showcasing groundbreaking innovations and trends that shape the future of technology. This event brings...
FROM BEEPERS TO BYTES I recently got a copy of the National Cybersecurity Plan 2023-2028 from DICT Undersecretary for Connectivity, Cybersecurity, and Upskilling, Jeffrey Ian C. Dy. I recall that when Usec Dy was appointed assistant secretary, he initiated a thorough overhaul of the NCSP. He aimed...
FROM BEEPERS TO BYTES The Commission on Elections (Comelec) is gearing up to tackle fast-moving threats to the 2025 elections as advancements in artificial intelligence (AI) and other technologies have made interference and meddling easier than ever before. To address these concerns, Commission on...
FROM BEEPERS TO BYTES The world of influencer marketing has long been plagued by the challenges associated with working with real-life personalities. Diva behavior, unreasonable demands, and chronic tardiness have become all too common complaints among brands and agencies alike. This frustration...
FROM BEEPERS TO BYTES While mainstream media is generally a reliable source of information, people must maintain a healthy dose of critical thinking. In an age where misinformation can spread quickly, the ability to evaluate and analyze news critically helps individuals discern facts from...
FROM BEEPERS TO BYTES A contradictory truth emerges in the complicated cybersecurity landscape: people are both the weakest link and the strongest asset in defending systems against cyberattacks. This duality stems from the complex interplay between human behavior, technological vulnerabilities,...
FROM BEEPERS TO BYTES As the Philippine government continues its campaign against SIM and mobile number-related crimes, scammers are evolving their tactics. They're increasingly using foreign phone numbers to mask their identities and trick unsuspecting users. This shift poses a new...
FROM BEEPERS TO BYTES Social media account profile cloning is a deceptive tactic where scammers create a fake profile that closely replicates your own. They meticulously copy your profile picture, name, and other publicly visible information like your hometown, interests, or...
Scammers have devised numerous ways to compromise Facebook accounts, and one method involves tricking users into handing over sensitive information through a series of calculated steps. Like many others, this scam preys on the user's trust and lack of awareness about the basics of online...
FROM BEEPERS TO BYTES Cybercriminals are disguising themselves as trusted message senders by manipulating the sender ID on text messages, making it appear that the messages are from legitimate companies. The sender ID appears to be the message’s source on your device. It is supposed to represent...