fbpx

Cybersecurity

Cybersecurity news, data security, data privacy, hackers, data breaches, information security, data loss, cloud security, cloud, threats, cybercrime, cybercriminals, application security, software

NIN verification using your NIN slip will no longer acceptable, use...

0
International Standard Organisation (ISO) 270001 Information Security Management System (ISMS) requires that organisations assess information security risks, put in place robust security controls and...

Four quick cybersecurity steps everyone must take right now

1
As convenient as Google Maps and Apple Maps are, it’s unnerving when your house and address number are visible to anyone on the internet. Here’s a secret. You can request a privacy blur over pictures of your home.

NIST Releases the Draft of Cybersecurity Framework 2.0 and introduces fundamental...

0
A cybersecurity framework is a structured approach or set of guidelines that organizations use to manage and improve their cybersecurity posture. These frameworks provide a structured methodology for identifying, assessing, and managing cybersecurity risks and ensuring the confidentiality, integrity, and availability of information and systems.

HOW HACKERS DELIVER MALICIOUS PAYLOAD TO MEDIA PROFESSIONALS

0
The moment you download the picture into a device without a licensed antivirus software with latest virus signature, a malicious script is downloaded and automatically executed in the device browser.

THE DANGER OF GIVING OUT BANK DETAILS ON SOCIAL MEDIA PLATFORMS...

0
May I reintroduce you to #CBN #eNaira account. eNaira is an official Nigerian Government digital wallet that holds the Nigerian Naira in electronic form.

Cybersecurity: Separate your Private Number from your Business Number

0
Given the government's new policy demanding that you synchronize your NIN and BVN to your Bank accounts, There are security implications if your bank-connected line is compromised.

Cybersecurity Awareness Month: InfoSec Best Practices for Businesses in the ever-evolving...

0
The primary goal of a cybersecurity strategy is to protect individuals, systems, networks, and digital assets from unauthorized access, theft, damage, or disruption.

The Seven (7) Layered Approach to Cybersecurity

0
A layered approach to cybersecurity is a comprehensive security strategy that involves multiple layers of defence to protect against cyber threats.

How to Recover a Hacked WhatsApp Account

0
If for whatever reason, your WhatsApp account is hacked and taken over, click on the link below and lodge a complaint to the WhatsApp Technical Support Team for assistance

Destiny Young | Top ’25 Cybersecurity Star of the Year’

0
"I have been actively involved in the campaign to ensure a safe internet by way of my contributing articles on cybersecurity and data privacy." - Young, D

Recent Posts

OpenAI Unveils Groundbreaking AI Model ‘o1’

0
The model significantly improves logical reasoning and problem-solving capabilities.

Breaking: Find your lost Android Device when Disconnected from the Internet

2
...Introducing the New and Improved Find My Device Network for Android Users In a world where losing your devices and accessories can be a real...

Google pushes the boundary with its Pixel 9 series phones powered by Gemini A1

0
With exclusive features and technology, Google is poised to challenge Apple and Samsung's dominance in the premium brand device category.

Unlocking the Future of Mobile Connectivity: Understanding eSIM

0
An eSIM, short for embedded SIM, is a rewritable SIM card embedded directly into a device's motherboard. It allows users to activate and manage cellular plans digitally, without the need for a physical SIM card.

University of Uyo: 2024/2025 Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data Science programmes

0
Applications are invited from suitably qualified candidates for admission into PGD and MSC in Cybersecurity, Data Sciences at the University of Uyo, for the 2022/2023 academic session.