Tuesday, February 27, 2024
No menu items!

cyber security

Dread of Drones: Are You Being Spied on By Drones?

Imagine mysterious flying objects flying overhead made to resemble birds, flies, or bees? Drone technology is being spoken about more frequently, especially in the context of surveillance and unmanned military vehicles in warfare. Drones are quickly gaining popularity for crucial...

Empowering Traders: FBS Introduces #TradersKnowBetter for Enhanced Security

FBS, a leading global broker, proudly unveils its new #TradersKnowBetter approach, placing traders at the forefront of its mission. Through this initiative, the broker announces its unwavering commitment to providing secure financial services trusted by traders worldwide. Cyber Security is...

Rising Cyberthreats Spur Local Businesses to Embrace AI and Cloud Security

With the cybersecurity landscape continually evolving, it is more important than ever for local businesses to keep pace with the changes. The increasing prevalence of threats like phishing, business email compromise (BEC), and ransomware, underscores the need for innovative...

Cybercriminals Exposed: ESET Researchers Crack the Code

Cybercriminals, Asylum Ambuscade have been exposed. The group has been active since 2020, and recently caught the attention of cybersecurity researchers. The group that has launched attacks on Ukraine's neighboring countries targets individuals, small and medium-sized enterprises (SMEs), banking...

Kenya’s businesses are dealing with 1 400 cyber-attacks each week

This year has seen a 29% rise in cyberattacks against businesses across the world. In Africa, this growing threat is driven by an increase in users accessing the internet, creating a larger pool of targets for criminals, which is...

Cyber Insurance: A Growing Demand for All Companies?

The advancement of connectivity in light of the digital revolution has radically transformed our lives and brought unprecedented benefits to companies in the way they operate and do business. However, digitalization is a double-edged sword and comes with risks as...

Nedbank Hack due to Poor Security at 3rd Party Facility, says Researcher

New information concerning the Nedbank data breach have emerged detailing the lax security at the 3rd party facility where the hack originated, reports My Broadband. Last month, IT News Africa covered the leak and the subsequent new information revealed by...

Top 4 Most Trending Stories – Week in Review

As the week comes to a close we take a look at the stories that resonated most with our readers. From gadget grading, Samsung v. Apple and quality control in networking to this year's botched Mobile World Congress - here's...

Majority of Malware Attacks in Africa Come from False Dating Apps

With Valentine’s day around the corner and fast approaching, everyone is looking for love – instead, they may find an online virus that is stealing their money. Ain’t that a kick in the head? Antivirus gurus Kaspersky say that while...

8 simple ways to protect yourself against identity theft

Are you doing enough to reduce the risk of having your identity stolen? As you start the New Year, this is a good time to reflect on what kind of measures you should take to prevent thieves from stealing...
- Advertisement -spot_img

Latest News

How is technology revolutionizing payment reconciliation for retailers?

As retailers expand into mid-market and beyond, the manual reconciliation of payments becomes increasingly complex and costly. With hundreds...
- Advertisement -spot_img