A couple of social accounts go dormant and inactive after a while for quite a…
Browsing: Security
Avast is planning to acquire AVG for $1.3 billion. When the acquisition is completed, antivirus…
Check Point Software Technologies Ltd has published its latest Threat Index for May 2016, revealing…
Kaspersky Lab has announced a major expansion of its enterprise security product portfolio with a…
Facebook for professionals, LinkedIn, has come open with information on data breach affecting some of…
According to Sage, with the threat of cyber-crime and insider fraud on the rise, Kenyan…
You never change things by fighting the existing reality. To change something, build a new…
Hackers are individuals that exploit weaknesses in a computer system to steal sensitive information. Today,…
WhatsApp has announced the implementation of end-to-end encryption for calls, messages photos, videos, files, and voice…
Cyber attacks are now prevalent. Relentless hackers use new methods to penetrate presumably hack proof systems. They steal sensitive information and money. These hackers target companies…
The Sahel label covers a fluid space that defies classical geographic description and is characterised…