Cyber Security as a Service

Cyber Security as a Service (CSaaS) Introduction Cybersecurity is a crucial priority for governments, organisations and businesses, most especially Small…

Data Loss Prevention – A necessary Tool to combat Data…

What is Data Loss prevention (DLP)? Data loss prevention is the ability or practice of preventing exfiltration of sensitive data or critical

YouTube Violated Kid’s Privacy – Google to pay…

Google Fined $170 million for Violating Kid’s Privacy on YouTube The Children Online Privacy Protection Act (COPPA) rule requires child-directed websites…

Credential Stuffing

Credential stuffing is a type of attack where stolen account credentials which comprises of username,passwords and email addresses are used to accomplish…

Privilege Escalation Vulnerability Discovered in Trend Micro…

Peleg Hadar, a security researcher at safe breach Labs has discovered a vulnerability in the Trend Micro Password Manager software. About Trend Micro…

How To Secure Your Wireless Access Point (WAP)

What is Wireless Access Point? A wireless access point is a hardware device or a configured node one local area network. It allows wireless capable

Google warns on Less Secure Applications (LSAs)

Apps that are less secure don't use modern security standards, such as OAuth. Using apps and devices that don’t use modern security standards increases the…

Cyber threat Intelligence can Save You.

The Importance of Cyber threat intelligence Cyber threat Intelligence involves tracking, and analyzing digital security threats with the sole aim of…

Cybersecurity In Africa – The Way to Go!

Cybersecurity In Africa. Let us look into the trend of cybersecurity in Africa in the past few years. How far has the Africa Region gone? Can we say the…

Business Email Compromise(BEC) AKA Wire-Wire

Business Email Compromise (BEC) Scam popularly known in Nigeria as “wire-wire” is a type of scam targeting companies that conduct wire transfers. Often,…

How to not Fall into the Trap of Cyber Attack Through…

Introduction Over the years and across different parts of the World, cybercriminals have mastered the art of phishing to lure their victims into…

Hackers can Manipulate Media Files via Whatsapp and Telegram

Security researchers at Symantec yesterday demonstrated multiple interesting attack scenarios against WhatsApp and Telegram Android apps, which could allow…
Subscribe to our newsletter
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
You can unsubscribe at any time
No event found!
>