Total 13 Posts
Have you ever had your personal information leaked on the internet? Maybe it was something you purchased online from a website, only to find out that the company was hacked months later? If the answer is “yes”, you probably want to know whether the breach was reported and dealt with.
With cryptocurrency fraud and IRS scams making headlines, I had thought Nigerian email schemes were a thing of the past, akin to the bygone days when a scammer might offer to sell you the Brooklyn Bridge. So I was surprised to recently come across an article about a 62-year-old Swedish
The Russian attacks on the 2016 U.S. presidential election and the country’s continuing election-related hacking have happened across all three dimensions of cyberspace – physical, informational and cognitive. The first two are well-known: For years, hackers have exploited hardware and software flaws to gain unauthorized access to computers and
The cybersecurity industry's approach to protecting our data simply isn't working anymore. It was built for the past. It was about outside threats, hackers finding their way inside, building bigger and more audacious security walls to befuddle the bad guys and protect us from threats. Such an approach was created
Despite the formation of the Communications Authority of Kenya's National Computer Incident Response Team/Coordination Centre (KE_CIRT/CC) in 2012, and the development of a national cyber security strategy in 2014, Kenya continues to lose an estimated Shs 2 billion shillings (US$ 19 million) yearly to cybercrime, a report
If you keep tabs on birthday notifications on Facebook, you’ll realize that there are several friends of yours who share a birthday. If so, what are the chances of two randomly chosen friends having the same birthday? This is a well-studied problem in statistics known as the Birthday Problem.