Born and raised in Manila;
Breaker of codes;
handler of incidents;
administrator of systems;
hacker of websites;
crafter of policies;
reanimator of dead computers;
first of his name.
Moo Deng: She is cute but for how long?
Get link
Facebook
X
Pinterest
Email
Other Apps
-
This pygmy hippopotamus has won the heart of the internet. It is an inevitability because Moo Deng is indeed quite cute. The question is for how long?
A few days ago, many people woke up to find unauthorized transactions in their GCash mobile wallets. These transactions, which occurred at a rate of Php 2,000 per transaction, even affected a local actress, drawing widespread attention. While the technical cause of these unauthorized transactions remains a mystery, I believe it’s crucial to address the underlying issue: GCash, and other mobile wallet applications in general, are essentially digital versions of physical wallets. Storing money in wallets, whether virtual or physical, inherently carries risks, with theft being the most significant concern. Physical wallets have been the target of various theft methods, and this raises the question: why do individuals, regardless of whether they use digital or physical wallets, keep a substantial amount of money in their wallets? Wouldn’t it be safer to deposit these funds in a bank or keep them securely at home? While this doesn’t absolve GCash of responsibility, it’s important to recogni...
In October 2024, a sneaky malware campaign started spreading. The threat actors used a message that looked like it came from the Israeli partner of ESET, a well-known anti-malware company. They targeted Israeli businesses and educational institutions. But here’s the catch: the message didn’t show any signs of having malicious content. Analysts who initially checked out the email thought there was nothing fishy about it. The email warns recipients that their company is being targeted by “state-sponsored threat actors.” It suggests downloading and installing the “ESET Unleashed” app to protect against this threat. The email’s link seems legitimate, pointing to a valid ESET server. The file on the download link contains an executable file (Setup.exe) and four DLL files. Upon closer inspection, it turns out that the DLL files are part of ESET’s anti-virus software, but the EXE file is actually a malicious data wiper but it was digitally signed by ESET. This malware has an interesting...
**WARNING:** This post is not intended for individuals who are easily offended. Should you find satirical content objectionable, please leave this page immediately. YOU HAVE BEEN WARNED. With the Philippine elections coming very soon, One of the most colorful part this national exercise is the proliferation of Party Lists that have a great name recall. In the Philippines, the party-list system is a mechanism of proportional representation in the election of representatives to the House of Representatives. This system allows national, regional, and sectoral parties or organizations to gain seats in the House based on the proportion of votes they receive. The goal of the party-list system is to ensure that marginalized and underrepresented sectors of society have a voice in the legislative process. Each party-list group represents specific sectors such as labor, farmers, women, youth, indigenous peoples, and other marginalized groups. Voters can choose a party-list group during el...
Comments
Post a Comment