University of Uyo launches master’s degree programme in Cybersecurity, Data Science
The TEDFUND Centre of Excellence in Computational Itelligence Research of the University will facilitate the programme. The duration for the programme is 2 years, made up of 4 Semesters.
Destiny Young | Top ’25 Cybersecurity Star of the Year’
"I have been actively involved in the campaign to ensure a safe internet by way of my contributing articles on cybersecurity and data privacy." - Young, D
Suspicious Hacking Attack Blocked!
RAT is malware an attacker uses to gain full administrative privileges and remote control of a target computer. And once access has been gained, the attacker launches its attacks without the knowledge of the system owner.
What if you misplace your phone, is your confidential data on...
Anti-theft allows you to remotely wipe all your data in the phone. You can sound alarm, trace the location, and lock the device.
THEFT: PROTECT CONFIDENTIAL DATA ON YOUR PHONE!
In conclusion, should your phone be stolen, to ensure your confidential information is not in the hands of the criminal, you can trigger a wipe data command from a remote #BitDefender website.
Massive Cybersecurity Breach Exposes Millions of Records in June 2023
Date: July 26, 2023
In a major blow to data security, the month of June 2023 witnessed a surge in cyber-attacks and data breaches, affecting...
What you can do if your phone is stolen
If the smartphone landed in the wrong hands and it is not protected, possibly not even by a screen lock, then time is of the essence.
DYTechTips: ENABLE SIM LOCK ON YOUR SIM CARD WITH A PIN...
Hacker or criminal can clone your phone number and whatever crime that SIM Number is used to perpetrate, there is a high possibility that security agencies will track the phone number back to you.
Privacy Policy: Meta Objects to sharing User Data with Security and...
privacy laws of the company prevented it from sharing user data with third parties.
BREAKING: N8,000 PALLIATIVE: CYBER CRIMINALS OUT TO DEFRAUD NIGERIANS
Cyber criminals have set up a phishing platform with which to harvest Sensitive Personally Identifiable information (SPII) and probably other banking details including BVN and Date of Birth of their potential victims.