BusinessMirror August 18, 2019

Page 1

ROTARY CLUB OF MANILA JOURNALISM AWARDS

2006 National Newspaper of the Year 2011 National Newspaper of the Year 2013 Business Newspaper of the Year 2017 Business Newspaper of the Year 2019 Business Newspaper of the Year

BusinessMirror

www.businessmirror.com.ph

A broader look at today’s business

Sunday, August 18, 2019 Vol. 14 No. 312

2018 EJAP JOURNALISM AWARDS

BUSINESS NEWS SOURCE OF THE YEAR

DEPARTMENT OF SCIENCE AND TECHNOLOGY

2018 BANTOG MEDIA AWARDS PHILIPPINE STATISTICS AUTHORITY

DATA CHAMPION

GUN WITH THE WIND n

P25.00 nationwide | 2 sections 20 pages | 7 DAYS A WEEK

MILF-led BARMM to decommission a third of MILF fighters, weapons as the long journey to peace and development continues.

IN this 2015 file photo, MILF chief Al Hajj Murad Ebrahim shows to reporters one of the homemade rocket-propelled grenade launchers turned over to an independent foreign body. MANUEL T. CAYON

D

By Manuel T. Cayon

AVAO CITY—From guns to plowshares, indeed. Complying with a 2015 agreement—evolving into an initial decommissioning in June 2018—to transform the south’s insurgent fields into zones of peace and development, the Moro Islamic Liberation Front (MILF) has announced it was implementing its promised decommissioning of its fighters and weapons. This, after it was handed the leadership of the government-promised autonomous region for Filipino Muslims in the south.

SOME of the fiercest Muslim rebel commanders in the southern Philippines take their oaths during a ceremony for the creation of the Bangsamoro Transition Authority at Malacañang in Manila, February 22, 2019. The Muslim rebels will serve as administrators of a new Muslim autonomous region in a delicate milestone to settle one of Asia’s longest-raging rebellions. Several commanders, including Commander Bravo, long wanted for deadly A2to Manila and join the ceremony. AP/BULLIT MARQUEZ attacks were given safety passesContinued to be able to on travel

Local Government Minister Naguib Sinarimbo of the Bangsa­ moro Autonomous Region in Muslim Mindanao (BARMM) said the MILF leadership will proceed with the decommissioning of its combatants, four years after it initially launched the first, and symbolic, decommissioning of 145 aging fighters and their weapons. This time the decommissioning of MILF fighters would involve a bigger number, estimated to be 30 percent of the members of MILF’s armed wing, the Bangsa­ moro Islamic Armed Force (BIAF). Sinarimbo said the decommissioning on September 7 will involve 12,000 combatants. Some 2,100 firearms will also be decommissioned. “Marami pong mga tao at maraming armas ang ide-decommission ng [Many people and many arms will Continued on A2

Millennial money: How to outsmart smartphone scammers

Y

By Sean Pyles | NerdWallet

OUR smartphone is your confidante, your hand-held connection to the world—and one of your biggest vulnerabilities.

Scammers can take advantage of day-to-day tasks that seem innocuous, like checking a bank balance or charging a phone at a public USB port, to exploit personal information for their profit. To keep that data safe, start by understanding the threats you face. Your phone has three main areas of vulnerability: its hardware, its software and your phone

number. Each carries a risk, and there are steps you can take to mitigate them.

Hardware vulnerability

A FOUR-DIGIT passcode alone isn’t enough to secure your phone’s hardware from intruders. One weakness comes from the charging port. Think twice before plugging into a public USB jack for

PESO EXCHANGE RATES n US 52.5190

a quick charge at a cafe or airport. “Any time you’re using a mobile port, you can be vulnerable to viruses or malware if you’re sharing it with other people who are plugging in their devices,” says Lisa Schifferle, ID theft program manager at the Federal Trade Commission. Using a public charging port at an airport is like “finding a toothbrush on the side of the road and deciding to stick it in your mouth,” Caleb Barlow, vice president of XForce Threat Intelligence at IBM Security, recently told Forbes. Hackers can modify these ports to install malevolent software, aka malware, on your phone. Once installed, it can transfer your phone’s data to hackers. The hacked

USB ports can also directly suck up your phone’s information. To avoid the risk, use your USB cord with your own charging block that can plug into a standard electrical outlet, or use an external battery pack. For daily security, go beyond the four-digit passcode if possible, says Gary Davis, chief consumer security evangelist at the cybersecurity company McAfee. “Passcodes aren’t as effective as biometrics, like fingerprint readers or facial recognition software, because people can do shoulder surfing to see your passcode and get into your phone” if they steal it.

Software and network risks

SCAMMERS can target your perContinued on A2

IN this December 17, 2018, file photo, people walk by a building in New York. You carry your smartphone everywhere. But the way you use it could leave you vulnerable to specific forms of identity theft, including robocall scams and hackers looking to hijack your phone number. AP/MARK LENNIHAN

n JAPAN 0.4949 n UK 63.4797 n HK 6.6983 n CHINA 7.4672 n SINGAPORE 37.8161 n AUSTRALIA 35.5816 n EU 58.3381 n SAUDI ARABIA 14.0028

Source: BSP (August 16, 2019 )


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.