Blog

  • PNP launches use of body cameras

    Eleazar officially gave the go-signal for police officers to use BWCs on Friday after over 600 personnel completed training on its use.

    He added that a BWC-equipped force will also ensure that there will be no violation in police operating procedures or human rights abuses.

    It will also protect PNP personnel from malicious and baseless charges.

    He also assured the public that the BWCs are tamper-proof and cannot be manually turned off by policemen wearing them.

    He added the BWC System, in support of the S.M.A.R.T. (Secured, Mobile, Artificial-Intelligence driven, Real-time Technology) Policing initiative of the PNP, will allow the PNP Command Center to monitor the actual police operations of all units nationwide.

    :PNA

  • Mining Ethereum with Norton 360

    Mining Ethereum with Norton 360

    NortonLifeLock, a global leader in consumer Cyber Safety, today announced the launch of Norton™ Crypto, a new feature designed to enable consumers to safely and easily mine cryptocurrency through its trusted Norton™ 360 platform. Selected Norton 360 customers in Norton’s early adopter program will be invited to mine for Ethereum.

    Norton Crypto delivers a secure, reliable way for consumers to mine for Ethereum without opening themselves and their devices up to pitfalls. Once cryptocurrency has been earned, customers can track and transfer earnings into their Norton Crypto Wallet, which is stored in the cloud so it cannot be lost due to hard drive failure.

    Contacts

    Jenna Torluemke
    NortonLifeLock Inc.
    (650) 527-6015
    [email protected]

    Erin Lundberg
    Edelman for NortonLifeLock Inc.
    (206) 280-3622
    [email protected]

  • Critical 0-day on a WordPress Plugin Under Active Attack

    Critical 0-day on a WordPress Plugin Under Active Attack

    On May 31, 2021, the Wordfence Threat Intelligence team discovered a critical file upload vulnerability being actively exploited in Fancy Product Designer, a WordPress plugin installed on over 17,000 sites.

    As this is a Critical 0-day under active attack and is exploitable in some configurations even if the plugin has been deactivated, we urge anyone using this plugin to update to the latest version available, 4.6.9, immediately.

    Fancy Product Designer is a WordPress plugin that offers the ability for customers to upload images and PDF files to be added to products. Unfortunately, while the plugin had some checks in place to prevent malicious files from being uploaded, these checks were insufficient and could easily be bypassed, allowing attackers to upload executable PHP files to any site with the plugin installed. This effectively made it possible for any attacker to achieve Remote Code Execution on an impacted site, allowing full site takeover.

    The majority of attacks against this vulnerability are coming from the following IP addresses:

    69.12.71.82
    92.53.124.123
    46.53.253.152

    For more WordPress plugins vulnerabilities, check out https://www.wordfence.com/blog/category/wordpress-security/

    Source: WordFence

  • GCash is planning to add cryptocurrency to its services

    GCash is an app that you can install on any of your devices—be it a smartphone or a tablet. It allows you to pay your bills, purchase goods and services, and even send or receive money wherever you are.

    Mobile wallet GCash is exploring the possibility of adding cryptocurrency to its growing portfolio of financial products and services.

    GCash president and chief executive officer Martha Sazon said the company, which is operated by Globe Fintech Innovations Inc., is looking into offering, buying, selling and storing cryptocurrency.

    Payment app giants such as PayPal and Square currently allow users to buy and sell cryptocurrency.

    GCash now allows its users to shop, save, invest, get insurance coverage, among others, through the app.

    Through a feature in the app called GInvest, users are allowed invest for as low as P50 in professionally managed local and global funds.

    Another feature called GInsure offers affordable insurance coverage for medical emergencies such as dengue, COVID-19, and accidents for as low as P300.

    For easy money management, GSave is a fully digital, secure, and hassle-free savings account that was built in partnership with CIMB Bank.

    It is fully accessible once the account is created and has no maintaining balance, no fees, and no initial deposit.

    Source: PHILSTAR



  • Fight Back Against Ransomware with Free Decryption Tools

    Fight Back Against Ransomware with Free Decryption Tools

    Don’t pay the ransom! This guide equips you with the knowledge and free tools to potentially recover your files locked by ransomware attacks.

    What is Ransomware and How Does it Work?

    Ransomware is a type of malicious software that encrypts your files, holding them hostage until you pay a ransom for their decryption. Unlike simpler forms that might lock your system, ransomware renders your data completely inaccessible.

    Free Ransomware Decryption Tools to the Rescue!

    Before giving in to extortion, try these free tools to regain control of your files:

    Remember: Prevention is Key

    While these tools offer a fighting chance, the best defense against ransomware is a proactive approach:

    • Regular System Updates: Patching vulnerabilities promptly closes potential entry points for ransomware.
    • Robust Antivirus Software: Invest in a reliable antivirus solution that actively scans for and blocks malware threats.
    • Frequent Data Backups: Regularly backing up your data ensures you have a clean copy to restore in case of an attack.

    By combining these free decryption tools with a strong security posture, you can significantly reduce the risk of ransomware crippling your digital life.

  • Wil to Play – Mobile game with real prizes

    Wil To play is Kuya Wil's official mobile game where you can win "real life" prizes and surprises. It is not just a single game but a collection of mini-games where five games can be played by game testers.
    
    You need an android phone or tablet, Gmail, and Internet to download and play the game. You will not be able to install the game if you do not have an invitation to join.
    
    The Exclusive INVITE ONLY GAME LAUNCH has only 2,000 slots. If you are not lucky enough to participate in the game launch today, just wait for the official launch where everyone can download and play Wil To Play.
    
    Prizes can change weekly or daily but for game testing the winners are "a sack of rice", Android tablet and Android Mobile phone.
    
    Official FB Page: https://www.facebook.com/WilToPlay/
    Offical website: https://www.wiltoplay.com/

  • Have I Been Pwned is now Open Source

    Have I Been Pwned is now Open Source

    The primary function of Have I Been Pwned since it was launched is to provide the general public a means to check if their private information has been leaked or compromised. Visitors to the website can enter an email address, and see a list of all known data breaches with records tied to that email address. The website also provides details about each data breach, such as the backstory of the breach and what specific types of data were included in it.

    Have I Been Pwned also offers a “Notify me” service that allows visitors to subscribe to notifications about future breaches. Once someone signs up with this notification mailing service, they will receive an email message any time their personal information is found in a new data breach.

    Pwned Passwords is Now Open Source via the .NET Foundation

    It’s a very simple codebase consisting of Azure Storage, a single Azure Function, and a Cloudflare worker.

    It has its own domain, Cloudflare account, and Azure services so can easily be picked up and open-sourced independently to the rest of HIBP.

    It’s entirely non-commercial without any API costs or Enterprise services like other parts of HIBP (I want community efforts to remain in the community).

    The data that drives Pwned Passwords is already freely available in the public domain via the downloadable hash sets.

     There’s a Have I Been Pwned organisation in GitHub that has the following 2 repositories:

    1. Azure Function
    2. Cloudflare Worker

    There’s a third repository in that organisation. Because there was so much enthusiasm over this 3D print earlier in the week, I’ve dropped the .stl into the 3D Prints repository so you can go and grab it and print it yourself

    Check if your email or phone has been compromised by a data breach here: https://haveibeenpwned.com/

  • Beware of Fake Anydesk Spread Via Google Ads

    Beware of Fake Anydesk Spread Via Google Ads

    AnyDesk is a remote desktop application distributed by AnyDesk Software GmbH. The proprietary software program provides platform independent remote access to personal computers and other devices running the host application. It offers remote control, file transfer, and VPN functionality.

    A fake AnyDesk installer is distributed through malicious Google ads placed by the threat actor, which are then served to unsuspecting people who are using Google to search for ‘AnyDesk.’

    The fraudulent ad result, when clicked, redirects users to a social engineering page that’s a clone of the legitimate AnyDesk website, in addition to providing the individual with a link to the trojanized installer.

    The company also said it notified Google of its findings, which is said to have taken immediate action to pull the ad in question.

    Be sure to download only from their official website at https://anydesk.com/en

  • Remotely Access Your MikroTik Router Easily with Remote WinBox

    Managing your MikroTik devices remotely has never been easier. Whether you’re providing tech support, managing a router behind LTE, or simply need to access your device while traveling, Remote WinBox offers a fast, secure, and user-friendly way to connect to your MikroTik routers from anywhere in the world.

    What is Remote WinBox?

    Remote WinBox is a cloud-based service that lets you connect to your MikroTik router via the familiar WinBox interface—without needing static IPs, public addresses, or complicated VPN setups. It’s designed to make remote access seamless and secure, especially when dealing with private networks or routers behind NAT (like LTE or mobile networks).

    Why Use Remote WinBox?

    Here are a few key reasons why Remote WinBox is ideal for MikroTik users:

    • No Public IP Needed – Works even when your MikroTik is behind NAT or on private LTE networks.
    • 🔒 Secure Access – All connections are encrypted, giving you peace of mind when managing your network remotely.
    • 🌍 Global Accessibility – Whether you’re across town or across the globe, you can log in and access your router via WinBox.
    • 🚀 Fast Setup – Get up and running in minutes with minimal configuration.

    Common Use Cases

    Remote WinBox is perfect for:

    Anyone needing quick, secure, and reliable WinBox access

    Quick Start Guide

    Getting started is simple. Just follow the steps in the official RemoteWinbox Guide, which walks you through everything from registration to configuration. In just a few minutes, you’ll have remote WinBox access up and running.

    👉 Click here to view the RemoteWinbox Quick Start Guide

    Ready to Try It?

    If you’re confident in setting it up on your own, you can dive straight into the platform.
    Visit RemoteWinbox.com and get started today.

  • Download NBA 2K21 for Free

    Download NBA 2K21 for Free

    NBA 2K21 is the latest release in the world-renowned, best-selling NBA 2K series. With exciting improvements upon its best-in-class gameplay, competitive and community online features, and deep, varied game modes, NBA 2K21 offers one-of-a-kind immersion into all facets of NBA basketball and culture – where Everything is Game.

    Download here: https://www.epicgames.com/store/en-US/p/nba-2k21

    Sale ends 5/27/2021 at 11:00 PM

Close filters
Products Search