The 2018 Annual Cyber Security Report: Impact on Government has found that cyber attacks against US government agencies are increasing daily. These threats include ransomware, distributed denial of service (DDoS), IoT botnets, cryptojacking, and other combinations of threats. Meanwhile, global cybersecurity company Kaspersky Lab reported that Asia has become a hotbed for cyber threats - with countries such as Singapore, Taiwan, Malaysia, the Philippines becoming targets by state-sponsored and highly...

Crowdfunding is a means to raise funds for a specific project. It is done through platforms where backers may pledge varying amounts of money depending on the amounts set by the person heading the project. It is often used as a means to raise capital for a person to produce a product, often involving new technology....

The recent years have seen a huge boom in the use of cryptocurrencies driving their prices up and introducing  people to a new investment opportunity. Among the means to obtain cryptocurrency is through mining. Mining is analogous to mining gold, there being a finite number of coins per cryptocurrency. Mining requires the use of immense amounts of computing power. Miners often utilize multiple Graphics Processing Units in one computer just...

The world has seen tremendous developments on artificial intelligence (AI).. From simple computing tasks, AI and Machine Learning (ML)  has spawned several business applications such as cybersecurity defense, human resources, market prediction, accelerated reading, accounting, Fintech, and healthcare. AI-powered chatbots are ubiquitous  in the tech scene and  serve a wide-array of purposes. ...

Blockchain technology brings about certain challenges, particularly in terms of compliance with the Data Privacy Act (DPA). In a nutshell, the DPA mandates that individuals must have control over the use or removal of their data. In contrast, blockchain’s greatest feature is its unchangeable record or immutability. On the surface, these concepts seem in direct conflict.[1] However, as will be shown below, these two apparently conflicting concepts may be reconciled....

It is no secret that the Philippine bureaucracy is inefficient. This is shown by the long line of driver's license applicants in the Land Transportation Office (LTO) in East Avenue. Up to now, the LTO still employs personnel to manually input applicants' personal details into the computer, charging generously for this menial and non-essential task. This is the kind of inefficiency that plagues most government agencies which can ultimately be...

There have been reports on the police using the global positioning tracker (GPS) of stolen vehicles[1] or smartphones[2] to catch suspects. Last December 2015, the Philippine National Police Highway Patrol Group (PNP-HPG) had a breakthrough in the “rent-sangla” scheme where 1,800 vehicles were stolen[3]. The PNP-HPG was able to recover 606 vehicles by using the GPS installed in said vehicles[4]....

What is AI and how is it created?Artificial intelligence is no longer a creation of science fiction. It now exists in everyday life, from stock market trading to facial recognition in social media. Artificial Intelligence has become a staple in everyday life even without people noticing it.  Artificial Intelligence takes the form of computer software taking in data and executing an algorithm to predict results that we use, from which...

The influx of global investments for financial technology (Fintech) in the past year reached an all time-high of 27.4 billion US dollars.[1] As a disruptive technology, Fintech forced many businesses to study ways to adapt to this highly innovative industry....

In the midst of growing data breaches affecting a wide array of industries and applications, it has been increasingly necessary to safeguard personal data collection and processing through more stringent policies. The latest General Data Protection Regulation (GDPR) of the EU requires companies which handle personal data of European citizens to strictly comply with the GDPR standards. This recent development inevitably pushes the Philippines to stay abreast with its cybersecurity...