fbpx

Cybersecurity

Cybersecurity news, data security, data privacy, hackers, data breaches, information security, data loss, cloud security, cloud, threats, cybercrime, cybercriminals, application security, software

NIST Releases the Draft of Cybersecurity Framework 2.0 and introduces fundamental...

0
A cybersecurity framework is a structured approach or set of guidelines that organizations use to manage and improve their cybersecurity posture. These frameworks provide a structured methodology for identifying, assessing, and managing cybersecurity risks and ensuring the confidentiality, integrity, and availability of information and systems.

Destiny Young | Top ’25 Cybersecurity Star of the Year’

0
"I have been actively involved in the campaign to ensure a safe internet by way of my contributing articles on cybersecurity and data privacy." - Young, D

Cybersecurity tops the list of concern as INEC team met with...

0
INEC Team led by Prof. Mahmood Yakubu and @IFES1987 tech partners from Google and Microsoft, at a meeting held at the IFES HQ, Arlington, Virginia on Wednesday.

Build a Career in Cybersecurity: From a Newbie to an Elite-class...

0
Building a career in cybersecurity requires dedication, continuous learning, and a passion for protecting digital assets.

BREAKING: NUC Restructures Nigerian Universities Computing Programme into Distinct Disciplines; Cybersecurity,...

0
Quite notable is the splitting of Computing into Cybersecurity, Software Engineering, Data Science, Information and Communication Technology, Information Technology, Information Systems, and Computer Science

Nigeria: Personal Data Privacy; Matter Arising

0
Data Privacy focuses on the rights of individuals, the purpose of data collection and processing, privacy preferences, and the way organizations govern personal data of individuals

Embracing Zero Trust in Cybersecurity: A Strategic Approach for Enhanced Cyber...

0
Embracing Zero Trust in cybersecurity is not just a best practice; it is a strategic imperative for organizations seeking to fortify their defences against evolving cyber threats.

How An Attacker Can Hack Your Fingerprint

0
If the potential victim swipes the screen during a call, the attacker can reconstruct parts of the fingerprint from the sound it makes.

We recorded over 12.9 million cyberattacks on presidential poll, says FG

0
During this period, a series of hacking attempts were recorded, including Distributed Denial of Service (DDoS), email and IPS attacks, SSH Login Attempts, Brute force Injection attempts, Path Traversal, Detection Evasion, and Forceful Browsing.

CYBERSECURITY – NITDA WEBSITE HACK; WHY ISO27001 IT SECURITY CONTROLS ARE...

0
The threat actors exploited a vulnerability in NITDA's web server database and were able to modify the website's [index.html] - a default page in a website's directory.

Recent Posts

OpenAI Unveils Groundbreaking AI Model ‘o1’

0
The model significantly improves logical reasoning and problem-solving capabilities.

Breaking: Find your lost Android Device when Disconnected from the Internet

2
...Introducing the New and Improved Find My Device Network for Android Users In a world where losing your devices and accessories can be a real...

Google pushes the boundary with its Pixel 9 series phones powered by Gemini A1

0
With exclusive features and technology, Google is poised to challenge Apple and Samsung's dominance in the premium brand device category.

Unlocking the Future of Mobile Connectivity: Understanding eSIM

0
An eSIM, short for embedded SIM, is a rewritable SIM card embedded directly into a device's motherboard. It allows users to activate and manage cellular plans digitally, without the need for a physical SIM card.

University of Uyo: 2024/2025 Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data Science programmes

0
Applications are invited from suitably qualified candidates for admission into PGD and MSC in Cybersecurity, Data Sciences at the University of Uyo, for the 2022/2023 academic session.