fbpx

Nigeria to have a Data Protection Law

0
...as Buhari writes Senate, seeks approval of Data Protection Bill

Transfer files easily between Android devices and Windows PCs

0
Google is introducing Nearby Share Beta for Windows, an app that helps you share files between Android devices and Windows PCs. How to use Nearby...

BE GUIDED: AN ANDROID TROJAN TARGETS YOUR BANKING DATA

0
The Android Banking Trojan invades your Android system by posing as a legitimate application. However, once it’s in the system, the victim’s device becomes part of the botnet controlled by the hacker.

Now, you can verify information on Google Search

0
Google announces new ways to verify info in Search: What are they, how will they help users and more Google is a go-to platform for most...

Cybersecurity Warning:  Online News Readers are the next target.

0
HEUR:Trojan.Script.Generic is a malicious executable file that can be run on the computer via remotely or locally. Once operational, the hackers can be able to perform various malicious actions that could further harm the computer.

HOW HACKERS DELIVER MALICIOUS PAYLOAD TO MEDIA PROFESSIONALS

0
The moment you download the picture into a device without a licensed antivirus software with latest virus signature, a malicious script is downloaded and automatically executed in the device browser.

NCC-CSIRT Warns of Pirated YouTube Software-related Malware

0
Furthermore, the advisory recommends installation of antivirus software with internet security and keeping it up to date,...

We recorded over 12.9 million cyberattacks on presidential poll, says FG

0
During this period, a series of hacking attempts were recorded, including Distributed Denial of Service (DDoS), email and IPS attacks, SSH Login Attempts, Brute force Injection attempts, Path Traversal, Detection Evasion, and Forceful Browsing.

Cybersecurity Caution: FREE WI-FI AT PUBLIC PLACES

1
The hacker will use a Man-in-the-middle hacking tool called Gold Phisher and sits in between the hotspot and the internet and eavesdrops on those connecting to the internet via his network.

ISO 27001 ISMS Compliance Clause 5.1: Organisational Leadership and Commitment

0
They need to ensure that the information security policy and security objectives are established and that they align with the strategic direction of the organization.

Recent Posts

The Threat of Deepfakes: AI and Machine Learning in the Fight Against Synthetic Media

0
Deepfakes, a type of synthetic media produced using artificial intelligence have lately been somewhat well-known due to their incredible realism in audio, video, and picture manipulation. Deepfakes, which are now used for public dishonesty, false information distribution, and reputation damage, have progressed from a benign form of online amusement to a major cause of worry.

The Importance of Cyber Hygiene in a Modern Workplace

0
As technology continues to transform the business landscape, maintaining strong cyber hygiene practices is no longer optional – it's a critical component of organizational success and resilience

Cybersecurity in Government Organizations, The Case of OAGF Hack: A Call to Action

2
By Destiny Young, a Chartered Information Technology Practitioner and Cybersecurity Engineer Introduction The recent hack of the Office of the Accountant General of the Federation (OAGF)...

Zero Trust Architecture in a Remote World: Securing the New Normal

0
With remote work becoming increasingly common, organizations require a security model that can adjust to the unique challenges presented in this new setting

Apple vs Android:  Comparing and Contrasting Features

0
Some features may be available on certain device models or through third-party apps, even if they're not native to the operating system.