Toggle Accessibility Statement
Skip to Home
Skip to Content
Skip to Site Map
The iGovPhil Project officially adopts the Web Content Accessibility Guidelines (WCAG 2.0) as the accessibility standard for all its related web development and services. WCAG 2.0 is also an international standard, ISO 40500. This certifies it as a stable and referenceable technical standard. WCAG 2.0 contains 12 guidelines organized under 4 principles: Perceivable, Operable, Understandable, and Robust (POUR for short). There are testable success criteria for each guideline. Compliance to these criteria is measured in three levels: A, AA, or AAA. A guide to understanding and implementing Web Content Accessibility Guidelines 2.0 is available at: https://www.w3.org/TR/UNDERSTANDING-WCAG20/ All iGovPhil Project services and content are currently moving towards WCAG Level A compliance. Work is being done to make the system fully compliant with this level. Accessibility Features Shortcut Keys Combination Activation Combination keys used for each browser. Chrome for Linux press (Alt+Shift+shortcut_key) Chrome for Windows press (Alt+shortcut_key) For Firefox press (Alt+Shift+shortcut_key) For Internet Explorer press (Alt+Shift+shortcut_key) then press (enter) On Mac OS press (Ctrl+Opt+shortcut_key) Accessibility Statement (Combination + 0): Statement page that will show the available accessibility keys. Home Page (Combination + H): Accessibility key for redirecting to homepage. Main Content (Combination + R): Shortcut for viewing the content section of the current page. FAQ (Combination + Q): Shortcut for FAQ page. Contact (Combination + C): Shortcut for contact page or form inquiries. Feedback (Combination + K): Shortcut for feedback page. Site Map (Combination + M): Shortcut for site map (footer agency) section of the page. Search (Combination + S): Shortcut for search page. Press esc, or click the close the button to close this dialog box.
×
Home
About Us
Our History
Key Officers
Organizational Function
Capabilities
Plans and Programs
Citizen's Charter
directory
Procurement
2018
Invitation to BID
2019
Invitation to BID
2020
invitation bid 2020
2021
invitation bid 2021
2022
Invitation Bid 2022
NOTICE TO PROCEED 2022
2023
Invitation to Bid 2023
Notice To Proceed 2023
Notice of Award 2023
Procurement Monitoring Report.
Cyber Security Bulletin
Disclaimer
Privacy Notice
Accomplishments
Resource Management
PCR
Operational Accomplishment 2019
Press Releases
AUXILIARY MENU
GAD Corner
IEC Materials
RA 9262
RA 8353
RA 7877
RA 9208
e-Library
Laws
RA 10175
RA 9995
RA 8484
RA 11202
RA 9775
RA 11188
Most Wanted Person
Digital Forensic Forms and Directives
Quality Policy
Types of Scam
Online Shopping Scam
Nigerian Scam
Inheritance Scam
Overpayment Scam
Rebate Scam
GOVPH
MENU
PNP
Home
About Us
Our History
Key Officers
Organizational Function
Capabilities
Plans and Programs
Citizen's Charter
directory
Procurement
2018
Invitation to BID
2019
Invitation to BID
2020
invitation bid 2020
2021
invitation bid 2021
2022
Invitation Bid 2022
NOTICE TO PROCEED 2022
2023
Invitation to Bid 2023
Notice To Proceed 2023
Notice of Award 2023
Procurement Monitoring Report.
Cyber Security Bulletin
Disclaimer
Privacy Notice
Accomplishments
Resource Management
PCR
Operational Accomplishment 2019
Press Releases
Accessibility Button
Accessibility Statement
Toggle High Contrast
Skip to Content
Skip to Footer
Republic of the Philippines
ANTI-CYBERCRIME GROUP
National Headquarters, Philippine National Police, Camp BGen Rafael T Crame
Cyber Security Bulletin
GAD Corner
IEC Materials
RA 9262
RA 8353
RA 7877
RA 9208
e-Library
Laws
RA 10175
RA 9995
RA 8484
RA 11202
RA 9775
RA 11188
Most Wanted Person
Digital Forensic Forms and Directives
Quality Policy
Types of Scam
Online Shopping Scam
Nigerian Scam
Inheritance Scam
Overpayment Scam
Rebate Scam
9th Anniversary Magazine
Keeping Safe Online
Filters
Display #
5
10
15
20
25
30
50
100
All
Filter
List of articles in category Security Bulletins
Title
Hits
ACG-CYBER SECURITY BULLETIN NR 293: Be Wary of Credential Dumping Attack
Hits: 244
ACG-CYBER SECURITY BULLETIN NR 292: Understanding the Risk of Cryptocurrency Gaming Scheme
Hits: 2736
ACG-CYBER SECURITY BULLETIN NR 291: Understanding the Risk of Mirai Botnet Attack
Hits: 397
ACG-CYBER SECURITY BULLETIN NR 290: New MacStealer macOS Malware Steals iCloud Keychain Data and Passwords
Hits: 2215
ACG-CYBER SECURITY BULLETIN NR 289: Be Wary of SharpPanda Advance Persistent Threat (APT) Spying Campaign
Hits: 1732
ACG-CYBER SECURITY BULLETIN NR 288: Understanding the Risk of Macaw Ransomware
Hits: 1021
ACG-CYBER SECURITY BULLETIN NR 287: Be Wary of Endpoint Security Threats
Hits: 1089
ACG-CYBER SECURITY BULLETIN NR 286:Understanding the Risk of Insider Threats on Cyber Security
Hits: 1230
ACG-CYBER SECURITY BULLETIN NR 285: Understanding the Risk of BlackByte Ransomware
Hits: 713
ACG-CYBER SECURITY BULLETIN NR 284: Understanding the Risk of Luna Ransomware
Hits: 739
Page 1 of 22
Start
Prev
1
2
3
4
5
6
7
8
9
10
Next
End
Subcategories
Identity Theft
Types Online Scam
Pulis Serbis Balita
E-ACCESS
DILG Annual Report 2021
More Articles
FAKE ONLINE SELLER NABBED BY ACG
PNP opens digital forensic lab in CDO October 23, 2013
“73 CHINESE NABBED FOR TELECOM FRAUD TO BE DEPORTED”
“PNP ACG NABS SUSPECT FOR ACCESS DEVICE FRAUD, IDENTITY THEFT”
“PNP ACG NABS SUSPECT FOR ONLINE THREAT, ABUSE, RAPE”
“PNP ACG NETS 151 CHINESE NATIONALS LINKED TO TELECOM FRAUD”
Most Read
Contact Directory
CYBERCRIME THREAT LANDSCAPE IN THE PHILIPPINES
Common Types of Internet Fraud Scams
RA 8484 – Access Devices Regulation Act of 1998
Key Officers
ACG wants you! Be a Cyber Cop
PNP celebrates 112th anniversary
More E-Books
Latest Articles
Annual Procurement Plan cy 2024
Breaking Down Barriers: ACG Unveils Scammers' Latest Tricks in the Post-SIM Registration Law Era
ACG ISSUES WARNING OVER SURGE IN “TASK SCAM” INCIDENTS
ACG-CYBER SECURITY BULLETIN NR 309: Be Wary of BlackCat Ransomware Attack
ACG-CYBER SECURITY BULLETIN NR 308: Understanding the Risk of Session Hijacking Attack
ACG-CYBER SECURITY BULLETIN NR 307: Beware of Malicious Abuse of Redirection Phishing Techniques