Author: Uduak Ekpo-Ufot

With 15 years of strategic and diverse work experience covering Innovation, Technology, Media & Telecommunications in West Africa, Uduak is a multi-skilled, result-oriented individual.

Malicious codes are part of a software system or script intended to cause undesired effects, security breaches or damage to a system. Examples include Virus, Worms, Trojan Horses, Spyware, Scareware & Adware, Rootkits, Active Contents, Zombies & Botnets and they typically are an application security threats that cannot be efficiently…

Read More