network-security
How to protect yourself from network attacks

[su_dropcap style="flat" size="5"]B[/su_dropcap]usinesses and governments have been urged to keep their network security up to…

Microsoft Linux based OS: Azure Sphere

Powering the Intelligent Edge In the next decade, nearly every consumer gadget, every household appliance,…

about meldown and spectre intel security flaw
Meltdown and Spectre: Intel CPU security flaws

While everyone else is exited about the new year, computer security researchers and tech workers…

hp-keylogger
Some HP laptops are hiding a deactivated keylogger

Researcher Michael Myng found a deactivated keylogger in a piece of software found on over 460 HP…

android-wifi-hack-img
Android devices vulnerable to new catastrophic Wi-Fi attack

Reports have emerged that the popular WPA2 Wi-Fi encryption protocol was fundamentally flawed, and could allow…

how-business-respond-to-ransomware
Here is How Businesses Should Respond to the Ransomware Surge

Modern endpoint security tools and incident response plans will be key in the fight against…

What is Petya/ Petrwrap ?

Petya is a type of ransomware that appeared in early 2016 and returned to a…

petya-ransomware
New RansomWare Outbreak spreading Fast!

Firms around the globe are reporting that they have been hit by a major cyber-attack.…

startup battlefield Africa
TechCrunch Battlefield Comes to Nairobi

You know, as a startup especially in tech and in this era of 'Disrupt' there…

malware
New Malware that utilizes 7 NSA Hacking Tools: WannaCry Used 2

A security researcher has identified a new strain of malware that also spreads itself by…