fbpx
Home Latest Cybersecurity

Cybersecurity

Cybersecurity news, data security, data privacy, hackers, data breaches, information security, data loss, cloud security, cloud, threats, cybercrime, cybercriminals, application security, software

Data Privacy: the need for compliance with NDPR

1
Cyber security threat landscape has grown exponential in recent years, with hackers using sophisticated technology to compromise networks and users.

BREAKING: N8,000 PALLIATIVE: CYBER CRIMINALS OUT TO DEFRAUD NIGERIANS

0
Cyber criminals have set up a phishing platform with which to harvest Sensitive Personally Identifiable information (SPII) and probably other banking details including BVN and Date of Birth of their potential victims.

CrowdStrike: Revolutionizing Cybersecurity

0
CrowdStrike is a leading cybersecurity company dedicated to protecting organizations from cyber threats

Kaspersky Security: Expect Rise in AI-powered attack in 2024

0
Kaspersky Global Research and Analyses Team (GReAT) experts offer insights and projections for 2024 in the Kaspersky Security Bulletin, with a focus on the evolution of Advanced Persistent Threats (APT).

Hackers attacked INEC Election Result Portal: “My Memo to APC Vindicates...

0
I saw this coming when I made a representation to the APC Constitution's Review and Drafting Committee for the need to amend its constitution and made provision for ICT Directorate and ensure the including of a functional cybersecurity unit

Destiny Young | Top ’25 Cybersecurity Star of the Year’

0
"I have been actively involved in the campaign to ensure a safe internet by way of my contributing articles on cybersecurity and data privacy." - Young, D

Cybersecurity Awareness Month: InfoSec Best Practices for Businesses in the ever-evolving...

0
The primary goal of a cybersecurity strategy is to protect individuals, systems, networks, and digital assets from unauthorized access, theft, damage, or disruption.

Mobile Safety: Ripping Through Technology | Destiny Young

0
Mobile phones have become an essential part of our lives. However, with the increasing use of mobile phones, the risk of cyber threats has also increased. Therefore, it is essential to take mobile safety seriously.

Securing a Hybrid Cloud Environment: Best Practices for Multi-Cloud Management by...

0
The first step to securing a hybrid cloud environment is to establish a clear security policy. This policy should define the organization's security goals and objectives

The Seven (7) Layered Approach to Cybersecurity

0
A layered approach to cybersecurity is a comprehensive security strategy that involves multiple layers of defence to protect against cyber threats.

Recent Posts

Breaking: Find your lost Android Device when Disconnected from the Internet

2
...Introducing the New and Improved Find My Device Network for Android Users In a world where losing your devices and accessories can be a real...

Google pushes the boundary with its Pixel 9 series phones powered by Gemini A1

0
With exclusive features and technology, Google is poised to challenge Apple and Samsung's dominance in the premium brand device category.

Unlocking the Future of Mobile Connectivity: Understanding eSIM

0
An eSIM, short for embedded SIM, is a rewritable SIM card embedded directly into a device's motherboard. It allows users to activate and manage cellular plans digitally, without the need for a physical SIM card.

University of Uyo: 2024/2025 Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data Science programmes

0
Applications are invited from suitably qualified candidates for admission into PGD and MSC in Cybersecurity, Data Sciences at the University of Uyo, for the 2022/2023 academic session.

How Countries Block Citizens from Using Certain Application

0
The country’s internet service providers (ISPs) are instructed to block the IP addresses associated with the application’s servers.