fbpx
Home Latest Cybersecurity

Cybersecurity

Cybersecurity news, data security, data privacy, hackers, data breaches, information security, data loss, cloud security, cloud, threats, cybercrime, cybercriminals, application security, software

STRIDE: Threat Modeling; Cybersecurity Risk Management Strategy

0
STRIDE ensures a comprehensive approach to threat modeling, covering various dimensions of system security.

University of Uyo launches master’s degree programme in Cybersecurity, Data Science

0
The TEDFUND Centre of Excellence in Computational Itelligence Research of the University will facilitate the programme. The duration for the programme is 2 years, made up of 4 Semesters.

Implementing ISO 27001 Information Security Management: The Processes

7
ISO/IEC 27001 helps you implement a robust approach to managing information security (infosec) and building cyber resilience within organisation.

Tinubu signs data protection bill into law

0
The Nigeria Data Protection Act, 2023 provides a legal framework for the protection of personal information and the practice of data protection in Nigeria.

CYBERSECURITY ALERT: DON’T RUSH TO OPEN THAT IMAGE, VIDEO OR MUSIC...

0
Please note, hackers use the technique called Steganography to deliver virus into your device and attack you.

CYBERSECURITY – NITDA WEBSITE HACK; WHY ISO27001 IT SECURITY CONTROLS ARE...

0
The threat actors exploited a vulnerability in NITDA's web server database and were able to modify the website's [index.html] - a default page in a website's directory.

BREAKING: N8,000 PALLIATIVE: CYBER CRIMINALS OUT TO DEFRAUD NIGERIANS

0
Cyber criminals have set up a phishing platform with which to harvest Sensitive Personally Identifiable information (SPII) and probably other banking details including BVN and Date of Birth of their potential victims.

Hackers attacked INEC Election Result Portal: “My Memo to APC Vindicates...

0
I saw this coming when I made a representation to the APC Constitution's Review and Drafting Committee for the need to amend its constitution and made provision for ICT Directorate and ensure the including of a functional cybersecurity unit

HOW TO CURB CYBERCRIME ARISING FROM THE USE OF DIGITAL BANK...

0
The criminal that opened the above PalmPay account should be investigated by first establishing the NIN Number that was used to register the number on a network.

Vulnerability Assessment and Penetration Testing: Lifecycle

0
Vulnerability assessment provides organizations with valuable insights into the security weaknesses present in their systems.

Recent Posts

Breaking: Find your lost Android Device when Disconnected from the Internet

2
...Introducing the New and Improved Find My Device Network for Android Users In a world where losing your devices and accessories can be a real...

Google pushes the boundary with its Pixel 9 series phones powered by Gemini A1

0
With exclusive features and technology, Google is poised to challenge Apple and Samsung's dominance in the premium brand device category.

Unlocking the Future of Mobile Connectivity: Understanding eSIM

0
An eSIM, short for embedded SIM, is a rewritable SIM card embedded directly into a device's motherboard. It allows users to activate and manage cellular plans digitally, without the need for a physical SIM card.

University of Uyo: 2024/2025 Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data Science programmes

0
Applications are invited from suitably qualified candidates for admission into PGD and MSC in Cybersecurity, Data Sciences at the University of Uyo, for the 2022/2023 academic session.

How Countries Block Citizens from Using Certain Application

0
The country’s internet service providers (ISPs) are instructed to block the IP addresses associated with the application’s servers.