About TrinSecurity

This author has not yet filled in any details.
So far TrinSecurity has created 42 blog entries.

The Mobile Backdoor

As we shift to digital, we also shift to mobile. Mobile devices are undeniably becoming an important part of our day to day lives. However, at the same time, cybercriminals are now also shifting their attention to mobile devices.Over the past years, the advancement in mobile technology greatly widens its participation not just in our [...]

By |2021-05-07T16:56:10+00:00May 5th, 2021|Insights, Technology|0 Comments

Cybersecurity and SMBs

The COVID-19 pandemic accelerated our transition into a fully-digital business world. Businesses from all scales and spectrum are quickly adapting to the demands of a fully-digital society. Also, along with this transition, the demand for better cybersecurity measures also increases. However, despite all the efforts, the number of cyber attacks doesn’t seem to diminish, instead, [...]

By |2021-04-15T20:15:07+00:00April 14th, 2021|Cyber Security, Cyber Threats|0 Comments

Device Rooting and Jailbreaking

Mobile devices have been our friends for a long time now. They have been our partners to our day to day tasks from personal to business stuff. As technology evolves, so as the technology and features associated with mobile devices. This is the reason why heavy priority is given to mobile security. When it comes [...]

By |2021-04-15T19:55:47+00:00April 7th, 2021|Software Security, Technology|0 Comments

Let’s talk about passwords!

Passwords play a very important role in cybersecurity. A password is code used to access a particular file or database. Its characters can be alphanumeric or with symbols. The more complex a password is, the better it would be. The main idea is to make the password unique to make it virtually impossible for other [...]

By |2021-04-15T19:35:15+00:00March 31st, 2021|Software Security, Technology|0 Comments

The Growing Concern on Compliance

In an almost fully digital society, cybersecurity isn’t just about having the latest antimalware technology, software, or protocols, or having the best people. For the most part, compliance plays an important role in the cybersecurity world. Understanding Compliance Before businesses are allowed to operate via digital means, security organizations and the government impose certain guidelines [...]

By |2021-04-15T18:18:57+00:00March 24th, 2021|Business Ethics, Insights|0 Comments


Since everything is now digital, information security has now become among the top priorities of most businesses. As critical business information and assets are now being processed digitally, the corresponding security has to keep up and be monitored. Apart from having the best technologies to protect your business, having dedicated personnel responsible for monitoring, updating, [...]

By |2021-04-15T18:11:41+00:00March 17th, 2021|Insights, Software Security|0 Comments

Third-Party Software Security

As things go digital, reliance on software applications whether for personal and business use went up dramatically. For generations, software programs and applications have been our friends in our digital needs. However, alongside digital improvement, threats are also everywhere. In a time where great demand and effort is invested in security, are we sure that [...]

By |2021-03-01T20:07:47+00:00March 10th, 2021|Services, Software Security|0 Comments

Attack Response and Threat Preparedness

The COVID-19 Pandemic put all governments to the test. How well did they respond to the pandemic? How ready are they? In the same manner, threats and attacks always test how prepared businesses are for cyberattacks. Under the radar Most of the successful attacks are those that are done under the radar - meaning those [...]

By |2021-03-01T19:53:28+00:00March 3rd, 2021|Cyber Security, Cyber Threats|0 Comments

Identifying Cyber Threats

Cyber threats are the “dangers” to which your entire digital network and system could be exposed to. In building a reliable security system, identifying these threats is important as it becomes the basis of how your security system is built. To better understand these threats, we identified several categories and areas to which these threats [...]

By |2021-03-03T08:55:48+00:00February 24th, 2021|Cyber Threats|0 Comments

Spotify Spots Stuffing Attacks

Spotify is probably the most popular music streaming software today. In 2019, Spotify recorded around 286 million users and continues to increase as years go by. Spotify is taking advantage of the massive shift to digital even in the music industry. However, a report posted in Threatpost.com last February 4, 2021, shows that the music [...]

By |2021-03-03T06:59:21+00:00February 17th, 2021|Cyber Threats|0 Comments
Go to Top