More

    Cybersecurity

    Vulnerabilities in wearables MQTT protocol for data transfer – Kaspersky

    Kaspersky experts have discovered that the MQTT protocol, most commonly used for transferring data from wearable devices used for remote patient monitoring, contained 33 vulnerabilities, including 19 “critical vulnerabilities” in 2021 alone.

    Google Project Shield to protect elections websites and individuals against cyberattacks 

    Google will be providing extra protection against online threats to at-risk organizations and individuals during the upcoming 2022 Philippine elections through its Project Shield.

    The 2022 cyberthreat landscape according to Kaspersky

    To give organizations and individuals a compass to help navigate the shifting cyberthreat landscape and secure the recovery phase of countries in the region, experts from Kaspersky’s Global Research and Analysis Team (GReAT) reveal the four top trends to look out for this year. 

    Trend Micro empowers women in IT with ‘Get IT Girl!’

    Get IT Girl! has been an initiative of Trend Micro’s since 2019, with the intention of empowering and uplifting women in the tech industry.

    GCheck these tips to spot phishing scams and protect yourself

    Scammers are getting more creative, so learn how to spot phishing scams so you can protect yourself and your hard-earned funds.

    Financial threats in 2022: predictions from Kaspersky

    What are the financial threats facing us in 2022? According to Kaspersky’s ‘Cyberthreats to Financial Organizations in 2022’ report, we will observe state-sponsored groups targeting the cryptocurrency industry.

    Safeguarding data, protecting the customers: A Globe Business Academy cybersecurity masterclass

    A recent Globe Business cybersecurity masterclass discussed identifying cyber threats and tailoring digital solutions for MSMEs, especially in the InfoComm and Administrative & Support industries. 

    Asia’s small and medium businesses are under cyberattack

    There is a common misconception that SMBs are less prone to cyberattacks than larger corporations. The reality is quite the opposite.

    Digital Ghost: Do you have one?

    If you have performed a transaction on the internet, chances are you have a digital ghost. And if your information falls into the wrong hands, it can become scary in real life! How do you deal with this?