FROM BEEPERS TO BYTESThe increasing prevalence of task scams targeting unsuspecting Filipinos seeking employment is alarming. These scams have become a significant concern as they exploit the desperation and hope of job seekers. Investigations have traced these fraudulent activities to illegal...
FROM BEEPERS TO BYTESI am currently in Taiwan, attending the annual Computex Taipei event, one of the most anticipated technology exhibitions in the world. Computex Taipei is renowned for showcasing groundbreaking innovations and trends that shape the future of technology. This event brings together...
FROM BEEPERS TO BYTESI recently got a copy of the National Cybersecurity Plan 2023-2028 from DICT Undersecretary for Connectivity, Cybersecurity, and Upskilling, Jeffrey Ian C. Dy. I recall that when Usec Dy was appointed assistant secretary, he initiated a thorough overhaul of the NCSP. He aimed to...
FROM BEEPERS TO BYTESThe Commission on Elections (Comelec) is gearing up to tackle fast-moving threats to the 2025 elections as advancements in artificial intelligence (AI) and other technologies have made interference and meddling easier than ever before. To address these concerns, Commission on...
FROM BEEPERS TO BYTESThe world of influencer marketing has long been plagued by the challenges associated with working with real-life personalities. Diva behavior, unreasonable demands, and chronic tardiness have become all too common complaints among brands and agencies alike. This frustration has...
FROM BEEPERS TO BYTES While mainstream media is generally a reliable source of information, people must maintain a healthy dose of critical thinking. In an age where misinformation can spread quickly, the ability to evaluate and analyze news critically helps individuals discern facts from bias...
FROM BEEPERS TO BYTESA contradictory truth emerges in the complicated cybersecurity landscape: people are both the weakest link and the strongest asset in defending systems against cyberattacks. This duality stems from the complex interplay between human behavior, technological vulnerabilities, and...
FROM BEEPERS TO BYTES As the Philippine government continues its campaign against SIM and mobile number-related crimes, scammers are evolving their tactics. They're increasingly using foreign phone numbers to mask their identities and trick unsuspecting users. This shift poses a new challenge...
FROM BEEPERS TO BYTES Social media account profile cloning is a deceptive tactic where scammers create a fake profile that closely replicates your own. They meticulously copy your profile picture, name, and other publicly visible information like your hometown, interests, or...
Scammers have devised numerous ways to compromise Facebook accounts, and one method involves tricking users into handing over sensitive information through a series of calculated steps. Like many others, this scam preys on the user's trust and lack of awareness about the basics of online...
FROM BEEPERS TO BYTESCybercriminals are disguising themselves as trusted message senders by manipulating the sender ID on text messages, making it appear that the messages are from legitimate companies. The sender ID appears to be the message’s source on your device. It is supposed to represent...