Peleg Hadar, a security researcher at safe breach Labs has discovered a vulnerability in the Trend Micro Password Manager software….
cybersecurityA collection of 69 posts
In recent years, smart home virtual assistants have come into wide use. These include products such as Google Home and…
Apps that are less secure don’t use modern security standards, such as OAuth. Using apps and devices that don’t use modern security standards increases the risk of accounts being compromised. Blocking these apps and devices helps keep your users and data safe.
The Importance of Cyber threat intelligence Cyber threat Intelligence involves tracking, and analyzing digital security threats with the sole aim…
Cybersecurity In Africa. Let us look into the trend of cybersecurity in Africa in the past few years. How far…
Introduction Over the years and across different parts of the World, cybercriminals have mastered the art of phishing to lure…
Security researchers at Symantec yesterday demonstrated multiple interesting attack scenarios against WhatsApp and Telegram Android apps, which could allow malicious…
Building a Cybersecurity Culture in Nigeria In the pursuit of holistic protection to information critical to day-to-day running of businesses,…
Majority of today’s data breaches and cyber attacks results from human error.The human firewall will ensure that your network is well protected and this can be achieved by ensuring you have a team of well trained employees.