How to protect yourself from network attacks
[su_dropcap style="flat" size="5"]B[/su_dropcap]usinesses and governments have been urged to keep their network security up to…
Microsoft Linux based OS: Azure Sphere
Powering the Intelligent Edge In the next decade, nearly every consumer gadget, every household appliance,…
Meltdown and Spectre: Intel CPU security flaws
While everyone else is exited about the new year, computer security researchers and tech workers…
Some HP laptops are hiding a deactivated keylogger
Researcher Michael Myng found a deactivated keylogger in a piece of software found on over 460 HP…
Android devices vulnerable to new catastrophic Wi-Fi attack
Reports have emerged that the popular WPA2 Wi-Fi encryption protocol was fundamentally flawed, and could allow…
Here is How Businesses Should Respond to the Ransomware Surge
Modern endpoint security tools and incident response plans will be key in the fight against…
What is Petya/ Petrwrap ?
Petya is a type of ransomware that appeared in early 2016 and returned to a…
New RansomWare Outbreak spreading Fast!
Firms around the globe are reporting that they have been hit by a major cyber-attack.…
TechCrunch Battlefield Comes to Nairobi
You know, as a startup especially in tech and in this era of 'Disrupt' there…
New Malware that utilizes 7 NSA Hacking Tools: WannaCry Used 2
A security researcher has identified a new strain of malware that also spreads itself by…