Security
  • Menu
  • All Tips
  • FAQs
  • Categories
  • Guidelines
  • Data Security Support
  • Tools
  • Have I Been Pwned?
  • Pwned Passwords
  • Email Checker
  • Password Generator
  • My IP
  • Privacy
DATA PRIVACY NOTICE AND CONSENT FORM

Cloudstaff is committed to protecting the privacy of its data subjects, and ensuring the safety and security of personal data under its control and custody. This policy provides information on what personal data is gathered by Cloudstaff Security Tips about its current, past, and prospective employees; how it will use and process this; how it will keep this secure; and how it will dispose of it when it is no longer needed. This information is provided in compliance with the Philippine Republic Act No. 10173, also known as, the Data Privacy Act of 2012 (DPA) and its Implementing Rules and Regulations (DPA-IRR). It sets out Cloudstaffs’ data protection practices designed to safeguard the personal data of individuals it deals with, and also to inform such individuals of their rights under the Act.

The personal data obtained from this application is entered and stored within the Cloudstaff system and will only be accessed by the Cloudstaff’s authorized personnel. Cloudstaff have instituted appropriate organizational, technical and cloud security measures (Amazon Web Services Shared Responsibility) to ensure the protection of the users personal data.

Information collected will be automatically deleted after three (3) years inactivity.

Furthermore, the information collected and stored in the application are as follows:
  • Given Name
  • Family Name
  • Avatar [Profile Picture]

USER CONSENT

I have read the Data Privacy Statement and expressed my consent for Cloudstaff to collect, record, organize, update or modify, retrieve, consult, use, consolidate, block, erase or destruct my personal data as part of my information.

I hereby affirm my right to be informed, object to processing, access and rectify, suspend or withdraw my personal data, and be indemnified in case of damages pursuant to the provisions of the Republic Act No. 10173 of the Philippines, Data Privacy Act of 2012 and its corresponding Implementing Rules and Regulations.

If you want to exercise any of your rights, or if you have any questions about how we process your personal data, please contact Cloudstaff’s Data Protection Officer, through the following channel:

Email to privacy@cloudstaff.com

  • Log in Now
Have some tips? Write it down and share it to your friends!

Click Login Now button to start!


Awareness is Power
 

Security begins with awareness, and even the smallest habits can strengthen your protection. Simple actions—like verifying senders or updating software—add up quickly. When you stay mindful of potential risks, you’re less likely to fall for common threats. Make awareness part of your routine to keep yourself and your data safe. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.


November 20, 2025 16:13 (on 11/21/25) |  0 | QR Ready | 1 minute read
New Phishing Tactics Use Fake Browser Pop-Ups to Steal Logins
 

Attackers using a Phishing-as-a-Service kit called Sneaky 2FA have added Browser-in-the-Browser (BitB) attacks to their tools. This method creates fake pop-up login windows that look real, helping criminals steal Microsoft account credentials. BitB works by copying the look of a normal login pop-up and showing what appears to be a legitimate URL, even though the page is fake.

In one example, victims visited a suspicious site, passed a bot check, and then clicked a “Sign in with Microsoft” button to view a fake PDF. A false Microsoft login window then appeared, stealing their login and session information.

Attackers also use CAPTCHAs, conditional loading, and fast-changing domains to hide from security systems. Sneaky 2FA further blocks code inspection and makes its phishing pages hard to analyze.

Researchers also found that malicious browser extensions can hijack the WebAuthn process, letting attackers fake...


November 19, 2025 16:35 (on 11/20/25) |  0 | 2 minutes read
Trick in the Middle
 

Be cautious of triangle scams, where a scammer poses as both buyer and seller to collect your product details, repost your item, and trick another person into paying them; they may sometimes even arrange a meet-up to appear legitimate. Always verify who you’re dealing with, share details carefully, avoid online payments, and keep communication on trusted platforms. When buying online always use cash on delivery and check the item before paying to stay safe and protected from scams.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


November 19, 2025 16:07 (on 11/20/25) |  0 | QR Ready | 1 minute read
No Tricks, Just Treats
 

Be cautious during holidays—scam activity often increases when people are distracted. Fraudsters use festive seasons to send fake offers, urgent messages, or impersonation calls. Take a moment to verify anything unexpected before responding. When in doubt, contact the source directly using a trusted method. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


November 18, 2025 15:46 (on 11/18/25) |  1 | QR Ready | 1 minute read
Ctrl Your Footprint
 

Be mindful of your online presence, as everything you post or share contributes to your digital footprint. Think before posting personal information, photos, or opinions, since they can have long-term consequences for your reputation and privacy. Regularly review your accounts and privacy settings to ensure only the right people can see your information.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


November 17, 2025 18:04 (on 11/18/25) |  0 | QR Ready | 1 minute read
Official Only
 

Always access services through their official websites rather than links sent in random messages. Unexpected links are a common tactic used in phishing attacks to steal your information. When in doubt, navigate to the site manually or use a trusted bookmark. Staying cautious with links helps protect your accounts and devices from compromise. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


November 16, 2025 16:13 (on 11/17/25) |  0 | QR Ready | 1 minute read
Inbox Imposters
 

Be cautious of phishing impersonation, where attackers use email or SMS to pose as trusted people or organizations in an attempt to steal information or trick you into taking harmful actions. Always verify the sender and avoid clicking links or responding to unusual requests. When unsure, delete the message and report it to security team or provider.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support


November 13, 2025 15:53 (on 11/13/25) |  0 | QR Ready | 1 minute read
Microsoft Patches Dozens of Windows Bugs, Including One Used by Hackers
 

Microsoft has released new security updates to fix 63 flaws in Windows and other products, including one that hackers are already taking advantage of.

The company says the most serious issue, known as CVE-2025-62215, affects the core of the Windows operating system. It could allow attackers who already have limited access to a computer to take full control of it. Microsoft discovered the problem itself and rushed to release a fix.

Cyber experts warn that hackers could use this flaw to move deeper into company networks once they’ve broken in through other means, such as phishing emails or malicious links.

The update also fixes two serious bugs that could let attackers remotely run malicious code, and another issue in Microsoft’s sign-in system that could let criminals impersonate users and access sensitive information.

Microsoft is urging all Windows users and businesses to install...


November 12, 2025 23:12 (on 11/13/25) |  0 | 1 minute read
Secrets Aren’t for Sharing
 

Always know what information is considered confidential. If you’re unsure whether something can be shared, ask before doing so. Sharing sensitive data without approval can lead to serious security risks. When in doubt, it’s always safer to verify first. 

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support. 


November 12, 2025 15:58 (on 11/12/25) |  0 | QR Ready | 1 minute read
Fewer, Safer
 

Keep your digital life simple by using only the apps, accounts, and devices you really need. Fewer digital tools mean fewer opportunities for hackers to access your information and easier management of passwords and updates. Being intentional with your technology not only protects your data but also makes your devices faster and more reliable.

Do you have a question? Submit a ticket at [PB8324.3] Data Security Support.


November 11, 2025 17:22 (on 11/12/25) |  0 | QR Ready | 1 minute read
  • First
  • «
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • »
  • Last


Submit New Tip



  2021 © Mazer

Security Tips v2.0.1 | Crafted with by Saugi