Nigeria to have a Data Protection Law
...as Buhari writes Senate, seeks approval of Data Protection Bill
Transfer files easily between Android devices and Windows PCs
Google is introducing Nearby Share Beta for Windows, an app that helps you share files between Android devices and Windows PCs.
How to use Nearby...
BE GUIDED: AN ANDROID TROJAN TARGETS YOUR BANKING DATA
The Android Banking Trojan invades your Android system by posing as a legitimate application. However, once it’s in the system, the victim’s device becomes part of the botnet controlled by the hacker.
Now, you can verify information on Google Search
Google announces new ways to verify info in Search: What are they, how will they help users and more
Google is a go-to platform for most...
Cybersecurity Warning: Online News Readers are the next target.
HEUR:Trojan.Script.Generic is a malicious executable file that can be run on the computer via remotely or locally. Once operational, the hackers can be able to perform various malicious actions that could further harm the computer.
HOW HACKERS DELIVER MALICIOUS PAYLOAD TO MEDIA PROFESSIONALS
The moment you download the picture into a device without a licensed antivirus software with latest virus signature, a malicious script is downloaded and automatically executed in the device browser.
NCC-CSIRT Warns of Pirated YouTube Software-related Malware
Furthermore, the advisory recommends installation of antivirus software with internet security and keeping it up to date,...
We recorded over 12.9 million cyberattacks on presidential poll, says FG
During this period, a series of hacking attempts were recorded, including Distributed Denial of Service (DDoS), email and IPS attacks, SSH Login Attempts, Brute force Injection attempts, Path Traversal, Detection Evasion, and Forceful Browsing.
Cybersecurity Caution: FREE WI-FI AT PUBLIC PLACES
The hacker will use a Man-in-the-middle hacking tool called Gold Phisher and sits in between the hotspot and the internet and eavesdrops on those connecting to the internet via his network.
ISO 27001 ISMS Compliance Clause 5.1: Organisational Leadership and Commitment
They need to ensure that the information security policy and security objectives are established and that they align with the strategic direction of the organization.