fbpx

Cybersecurity

Cybersecurity news, data security, data privacy, hackers, data breaches, information security, data loss, cloud security, cloud, threats, cybercrime, cybercriminals, application security, software

Nigeria Data Protection Law Can Create 500,000 Jobs – Cybersecurity Analyst

0
The Law is fundamentally a legal instrument meant to provide for what is called CIA in the information security industry. CIA stands for Confidentiality, Integrity, and Availability

Tinubu signs data protection bill into law

0
The Nigeria Data Protection Act, 2023 provides a legal framework for the protection of personal information and the practice of data protection in Nigeria.

Beware of ChatGPT app, there are malicious versions.

1
Meta, Facebook parent company has said it discovered that millions of Facebook users are being attacked following the installation of malicious ChatGPT app.

BE GUIDED: AN ANDROID TROJAN TARGETS YOUR BANKING DATA

0
The Android Banking Trojan invades your Android system by posing as a legitimate application. However, once it’s in the system, the victim’s device becomes part of the botnet controlled by the hacker.

HOW HACKERS DELIVER MALICIOUS PAYLOAD TO MEDIA PROFESSIONALS

0
The moment you download the picture into a device without a licensed antivirus software with latest virus signature, a malicious script is downloaded and automatically executed in the device browser.

NCC-CSIRT Warns of Pirated YouTube Software-related Malware

0
Furthermore, the advisory recommends installation of antivirus software with internet security and keeping it up to date,...

We recorded over 12.9 million cyberattacks on presidential poll, says FG

0
During this period, a series of hacking attempts were recorded, including Distributed Denial of Service (DDoS), email and IPS attacks, SSH Login Attempts, Brute force Injection attempts, Path Traversal, Detection Evasion, and Forceful Browsing.

Cybersecurity Caution: FREE WI-FI AT PUBLIC PLACES

1
The hacker will use a Man-in-the-middle hacking tool called Gold Phisher and sits in between the hotspot and the internet and eavesdrops on those connecting to the internet via his network.

CYBERSECURITY – NITDA WEBSITE HACK; WHY ISO27001 IT SECURITY CONTROLS ARE...

0
The threat actors exploited a vulnerability in NITDA's web server database and were able to modify the website's [index.html] - a default page in a website's directory.

Implementing ISO 27001 Information Security Management: The Processes

7
ISO/IEC 27001 helps you implement a robust approach to managing information security (infosec) and building cyber resilience within organisation.

Recent Posts

OpenAI Unveils Groundbreaking AI Model ‘o1’

0
The model significantly improves logical reasoning and problem-solving capabilities.

Breaking: Find your lost Android Device when Disconnected from the Internet

2
...Introducing the New and Improved Find My Device Network for Android Users In a world where losing your devices and accessories can be a real...

Google pushes the boundary with its Pixel 9 series phones powered by Gemini A1

0
With exclusive features and technology, Google is poised to challenge Apple and Samsung's dominance in the premium brand device category.

Unlocking the Future of Mobile Connectivity: Understanding eSIM

0
An eSIM, short for embedded SIM, is a rewritable SIM card embedded directly into a device's motherboard. It allows users to activate and manage cellular plans digitally, without the need for a physical SIM card.

University of Uyo: 2024/2025 Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data Science programmes

0
Applications are invited from suitably qualified candidates for admission into PGD and MSC in Cybersecurity, Data Sciences at the University of Uyo, for the 2022/2023 academic session.