Digital Media Investigation for Police
With the proliferation of digital media – whether in the form of video or photo images – investigators are often forced to manually review and analyze millions of digital files. Although more digital...
View ArticleITMS INSTALLS HIGH SPEED INTERNET AT THE PNP NATIONAL ELECTION MONITORING...
ITMS provided IT support and other technical services at the National Election Monitoring Action Center (NEMAC) situated at the Multi-Purpose Center (MPC) and at the National Operations Center (NOC) of...
View ArticleITMS developers learn modern web application: PHP Laravel Framework
A one-month training program on the use of PHP Laravel Framework was conducted at the PNP Information Technology Management Service thru the initiative of the Systems Management Division (SMD) and with...
View ArticlePNP ROAS: Simplified Recruitment
The ITMS System Management Division (SMD) Project Team conducted User’s Training of PNP Recruitment Online Application System (ROAS) on April 25, 2016 at the ITMS Training Laboratory to 30...
View ArticleITMS GOES ON WITH ITS COMPUTER PREVENTIVE MAINTENANCE PROGRAM
The Philippine National Police Information Technology Management Service continues its initiative to provide IT services to other PNP offices/units within the Camp Crame through its Computer Preventive...
View ArticleComputer Preventive Maintenance at DHRDD
The PNP ITMS conducted a preventive maintenance of computers at the Directorate for Human Resource and Doctrine Development (DHRDD) on May 10, 2016 to May 19, 2016. This is part of the Computer...
View ArticleSix ways to increase your iPhone and iPad security
The iPhone and iPad make our lives more convenient than ever, but they can also help us make them more private and more secure. Here’s how! Security is at perpetual war with convenience. The faster and...
View Article10 Tips To Tighten Security On Your Android Device
Smartphones have come to define us by being the portal to our online identity and as such should be treated with care and secured against any wrongdoing online (hacking) or offline (stolen). If you are...
View ArticleGame of the Generals Shootfest (The DND Challenge)
The PNP once again participated in the Game of the Generals Shootfest (The DND Challenge) on May 28, 2016 (Saturday) at the Defense Intelligence and Security Group (DISG) Firing Range, Camp Emilio...
View ArticleWebinar: Defending Against Cyberthreats: Are You Keeping Up?
An Analysis of CyberEdge’s 2016 Cyberthreat Defense Report Despite record security spending, successful cyber attacks are on the rise. Seventy-six percent of organizations around the globe were...
View ArticleEssential Open Source Security Tools
There are thousands of open source security tools with both defensive and offensive security capabilities. The following are essential security tools that will help you to secure your systems and...
View ArticleITMS Team Building 2016
The PNP-ITMS personnel took their time off from their assigned tasks at the office and joined the ITMS team building 2016 activity last June 9, 2016 at Blue Coral Beach Resort, Laiya, San Juan,...
View Article10 tips for solving common PC problems
My computer is slow The most common problem of all. A slow computer can cause many frustrations, but fortunately there is something you can do yourself before you replace it. There may be several...
View ArticleTen (10) Tips on How to Secure Android Phones
Disable app downloads from unknown sources The easiest way to get infected with malware on an Android phone or tablet is to start installing apps from outside the official Google Play app store. In the...
View Article6 Ways Law Enforcement Uses Social Media to Fight Crime
From felons on Facebook to tips through Twitter, social media is being used more and more by law enforcement agencies, and not just to fight Internet-related crimes. We’re talking about solving crimes...
View ArticleThreat Report: Web Attacks
Summary The Angler toolkit tops the list of web attacks by toolkit this month, comprising 51.2 percent of all toolkit activity. The Nuclear exploit kit, which topped April’s list, has dropped out of...
View ArticleThreat Report: Mobile & Social Media
Summary Manual sharing continues to dominate social media scams, though it declined another 7.91 percentage points from April. Fake Offers increased for the second month in a row, up from 20.7 percent...
View ArticleCreating the National Cybersecurity Inter-Agency Committee
MALACAÑAN PALACE MANILA BY THE PRESIDENT OF THE PRESIDENT EXECUTIVE ORDER NO. 189 CREATING THE NATIONAL CYBERSECURITY INTER-AGENCY COMMITTEE WHEREAS, the 1987 Constitution recognizes the vital role of...
View ArticleCovert Voice Commands Can Hack A Smartphone
Researchers from Georgetown University and the University of California, Berkeley say cybercriminals could use hidden voice commands via popular YouTube videos to infect Androids and iPhones with...
View ArticleHummingBad Malware Infects 85 Million Android Devices
A group of Chinese hackers dubbed Yingmob is using a sophisticated malware campaign called HummingBad to access and sell the info stored on Android devices. The malware may have already infected 85...
View Article