Total 14 Posts

How to protect yourself from cyber attacks that use your everyday devices

If you run a business, you’re probably concerned about IT security. Maybe you invest in antivirus software, firewalls and regular system updates. Unfortunately, these measures might not protect you from malicious attacks that enter your systems through everyday devices. On the evening of Friday the 24th of October 2008

Hackers are behind most data breaches according to research

Have you ever had your personal information leaked on the internet? Maybe it was something you purchased online from a website, only to find out that the company was hacked months later? If the answer is “yes”, you probably want to know whether the breach was reported and dealt with.

This is why "Nigerian Prince" scams continue to dupe us

With cryptocurrency fraud and IRS scams making headlines, I had thought Nigerian email schemes were a thing of the past, akin to the bygone days when a scammer might offer to sell you the Brooklyn Bridge. So I was surprised to recently come across an article about a 62-year-old Swedish

Weaponized information seeks a new target on the Internet

The Russian attacks on the 2016 U.S. presidential election and the country’s continuing election-related hacking have happened across all three dimensions of cyberspace – physical, informational and cognitive. The first two are well-known: For years, hackers have exploited hardware and software flaws to gain unauthorized access to computers and

We need to refocus the cybersecurity lens on people rather than threats

The cybersecurity industry's approach to protecting our data simply isn't working anymore. It was built for the past. It was about outside threats, hackers finding their way inside, building bigger and more audacious security walls to befuddle the bad guys and protect us from threats. Such an approach was created

Kenya Loses 2 Billion Shillings Annually Due To Cyber Crime

Despite the formation of the Communications Authority of Kenya's National Computer Incident Response Team/Coordination Centre (KE_CIRT/CC) in 2012, and the development of a national cyber security strategy in 2014, Kenya continues to lose an estimated Shs 2 billion shillings (US$ 19 million) yearly to cybercrime, a report

The Birthday Paradox and How It Is Applied To Hacking Passwords

If you keep tabs on birthday notifications on Facebook, you’ll realize that there are several friends of yours who share a birthday. If so, what are the chances of two randomly chosen friends having the same birthday? This is a well-studied problem in statistics known as the Birthday Problem.