Contactless cards has a built-in-radio frequency module that allows it to be processed without having to insert the card or…
BlogA collection of 105 posts
What is Wi-Fi 6 Wi-Fi 6 is the lastest Wi-Fi standard in town. The new naming convention from the Wi-Fi…
Okay! This isn’t my regular kind of post but trust me it is one amazing one. I got a message…
What is A fileless Malware? Fileless malware initially was considered to be malicious software that exists exclusively in computer memory,…
What is Threat Hunting? Threat Hunting means to proactively search for malware or attackers that are hiding in your network…
Antivirus was once the best way to protect endpoints (laptops, servers, workstations). They are designed to detect malicious programs(based on…
NaijaSecCon2019- Are You Ready? The third edition of the most technical Cyber security Conference in Nigeria is here again and…
In the days following the Easter holiday, a Ransomware attack hit Spectranet and Smile routers and affected users were unable…
Mobile devices are the new PC(Personal Computer) Why? Let us think about it.A lot of people have mobile devices compared…
