fbpx

Cybersecurity

Cybersecurity news, data security, data privacy, hackers, data breaches, information security, data loss, cloud security, cloud, threats, cybercrime, cybercriminals, application security, software

Cybersecurity Awareness Month: Tips to stay safe on the internet

0
Enable two-factor authentication (2FA): 2FA adds an extra layer of security to your accounts by requiring a second form of authentication, such as a fingerprint or a code sent to your phone.

Destiny Young | Top ’25 Cybersecurity Star of the Year’

0
"I have been actively involved in the campaign to ensure a safe internet by way of my contributing articles on cybersecurity and data privacy." - Young, D

CYBERSECURITY – NITDA WEBSITE HACK; WHY ISO27001 IT SECURITY CONTROLS ARE...

0
The threat actors exploited a vulnerability in NITDA's web server database and were able to modify the website's [index.html] - a default page in a website's directory.

Embedded Systems: The Need for a Specialized Cybersecurity Strategy

0
Embedded systems are often used with functionally-limited storage devices such as banking, savings or discount cards.

NCC-CSIRT Warns of Pirated YouTube Software-related Malware

0
Furthermore, the advisory recommends installation of antivirus software with internet security and keeping it up to date,...

Layered security architecture, a mechanism for implementing a secured network

0
The purpose of a multi-layered security approach is to ensure that each individual component of your cybersecurity plan has a backup to counter any flaws or gaps

CYBERSECURITY: HOW TO AVOID VISITING A HACKER’S NET (WEBSITE)

521
Install Focus as your second browser. When you want to visit an untrusted website, copy the URL, launch FOCUS and load it on FOCUS browser, browse it there.

Implementing ISO 27001 Information Security Management: The Processes

7
ISO/IEC 27001 helps you implement a robust approach to managing information security (infosec) and building cyber resilience within organisation.

CYBERSECURITY ALERT: DON’T RUSH TO OPEN THAT IMAGE, VIDEO OR MUSIC...

0
Please note, hackers use the technique called Steganography to deliver virus into your device and attack you.

Nigeria: Personal Data Privacy; Matter Arising

0
Data Privacy focuses on the rights of individuals, the purpose of data collection and processing, privacy preferences, and the way organizations govern personal data of individuals

Recent Posts

OpenAI Unveils Groundbreaking AI Model ‘o1’

0
The model significantly improves logical reasoning and problem-solving capabilities.

Breaking: Find your lost Android Device when Disconnected from the Internet

2
...Introducing the New and Improved Find My Device Network for Android Users In a world where losing your devices and accessories can be a real...

Google pushes the boundary with its Pixel 9 series phones powered by Gemini A1

0
With exclusive features and technology, Google is poised to challenge Apple and Samsung's dominance in the premium brand device category.

Unlocking the Future of Mobile Connectivity: Understanding eSIM

0
An eSIM, short for embedded SIM, is a rewritable SIM card embedded directly into a device's motherboard. It allows users to activate and manage cellular plans digitally, without the need for a physical SIM card.

University of Uyo: 2024/2025 Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data Science programmes

0
Applications are invited from suitably qualified candidates for admission into PGD and MSC in Cybersecurity, Data Sciences at the University of Uyo, for the 2022/2023 academic session.