In ongoing consultations with clients, large companies named targeted attacks and hacking as two of their biggest security challenges since …

In ongoing consultations with clients, large companies named targeted attacks and hacking as two of their biggest security challenges since …
First detected in 2011, the malware campaign that later became known as Windigo was able to infiltrate around 25,000 servers over …
How do fake cryptocurrency trading apps operate? How to protect yourself? If you’re a Poloniex user and have installed any …
Kenya has been widely celebrated as one of the foremost innovators around the question of financial inclusion. With the acclaim …
Internet security company ESET East Africa has issued an alert to mobile phone users running on the Android platfom to …
According to the words of the Honorable Warren E. Burger, lawyers and judges remain necessary to society, so long as …
There is no simple way to say this. Cybercriminals are pilfering Kenyans blind. The latter statement has been evidenced by …
Low levels of the requisite knowledge on how to deal with cyber-attacks is costing thousands of companies in emerging economies …
The number of serious and damaging DDoS attacks are increasing in number and severity, as reported by Neustar’s 2016 Worldwide DDos Attacks & …