Pantami, Danbatta, Jaji and others Harps on Collaboration to Improve Security
"... every component of society from the government at the highest level to private individuals has a role…
Tech | Business | Economy
"... every component of society from the government at the highest level to private individuals has a role…
HP Wolf Security report exposes ironic “honour among thieves” as cybercriminals rely on dispute resolution services - ₦1,230,793…
Luna in Rust: New ransomware group emerges using cross-platform programming language
The new matrix of Fusion Centres will provide 24/7 managed cyber security detection and response services to African…
Every day more and more people and businesses are held to ransom as exposed vulnerabilities are exploited by…
Education sector suffers highest data encryption rate and longest recovery time - Sophos
Kaspersky experts warn that this trend is a real fraud scheme, called vishing, and is actively used by…
The sheer scale and pace of today’s cyber threats could prove overwhelming for the security department, outpacing its…
“The COVID-19 pandemic only amplified the problem as many people suddenly had to work from home on unprotected…
Depending on the electrical/electronic (E/E) architecture, attackers can access systems through external communication channels, writes Evgeniya Ponomareva, Global…
In this post Check point Software explains if a web gateway can prevent SNI fraud. Detecting this stealth…
This year, during the first few days of July, Check Point Research (CPR) has already witnessed a 37%…
Report suggests that over 30,000 human rights activists, journalists and lawyers across the world may have been targeted…
Cybercrime is Spiking and Security Skills are Scarce: How to weather the approaching perfect storm
YouTube Comments now New Tool for Scammers?
The scammers choose trending videos on YouTube and leave comments promoting a fake “breach” in the crypto market…