Pantami, Danbatta, Jaji and others Harps on Collaboration to Improve Security
“… every component of society from the government at the highest level to private individuals has a role to play in achieving secure cyberspace” – Pantami.
“… every component of society from the government at the highest level to private individuals has a role to play in achieving secure cyberspace” – Pantami.
HP Wolf Security report exposes ironic “honour among thieves” as cybercriminals rely on dispute resolution services – ₦1,230,793 vendor bonds and escrow payments to ensure “fair” dealings
The new matrix of Fusion Centres will provide 24/7 managed cyber security detection and response services to African enterprises to help protect them from rampant and rising cybercrime
Every day more and more people and businesses are held to ransom as exposed vulnerabilities are exploited by criminals.
Kaspersky experts warn that this trend is a real fraud scheme, called vishing, and is actively used by cybercriminals.
The sheer scale and pace of today’s cyber threats could prove overwhelming for the security department, outpacing its resources.
“The COVID-19 pandemic only amplified the problem as many people suddenly had to work from home on unprotected computers and mobile phones”.
Depending on the electrical/electronic (E/E) architecture, attackers can access systems through external communication channels, writes Evgeniya Ponomareva, Global Alliance Manager, KasperskyOS Business Unit at Kaspersky
In this post Check point Software explains if a web gateway can prevent SNI fraud. Detecting this stealth technique can make the difference between a breach and staying safe
This year, during the first few days of July, Check Point Research (CPR) has already witnessed a 37% increase in daily Amazon-related phishing attacks compared to the daily average in June
Report suggests that over 30,000 human rights activists, journalists and lawyers across the world may have been targeted using a hacking software known as Pegasus, created by the NSO Group.
The scammers choose trending videos on YouTube and leave comments promoting a fake “breach” in the crypto market – Report
Cybercrime is Spiking and Security Skills are Scarce: How to weather the approaching perfect storm