How do fake cryptocurrency trading apps operate? How to protect yourself? If you’re a Poloniex user and have installed any …

How do fake cryptocurrency trading apps operate? How to protect yourself? If you’re a Poloniex user and have installed any …
This week, ESET is extremely proud to announce that it is the Bronze Award Winner of the 2017 Gartner Peer …
ESET combines with Google to improve the security of the Google Chrome browser Google and ESET have combined Chrome’s sandbox …
Cyber crime is costing Kenyan businesses billions of shillings in losses. Here’s ESET’s latest discovery on how easy it is …
Kenya has been widely celebrated as one of the foremost innovators around the question of financial inclusion. With the acclaim …
Internet security company ESET East Africa has issued an alert to mobile phone users running on the Android platfom to …
The high point of any democracy is the opportunity for citizens to participate in their State’s leadership through elections, general …
What are the Internet Security Guidelines for Africa? On the 30th of May, 2017, The Internet Society and the African …
It all begins with the MS17-010 Exploit The EternalBlue Exploit, otherwise known as MS17-010, developed by the NSA and pilfered …
Internet security company ESET East Africa has announced the availability of free cybersecurity training for businesses and their employees in …