Guest post by Chester Wisniewski, a principal research scientist at next-generation security leader Sophos. With Russian troops amassing on the...
Read moreExperts from Doctor Web uncovered weak passwords, strange conduct, and unencrypted data flows in numerous kinds of children's wearables that...
Read moreAccording to a report recently presented by cybersecurity specialists from Google, they have reported that it only takes less than...
Read moreA few months after finding that the Joker virus on the Huawei App store, Doctor Web researchers have revealed that...
Read moreGmail accounts are often utilized in recognition assaults that precede a more targeted phishing attempt. The attackers may use the...
Read moreDimension Data, a leading Systems Integrator and Managed Services Provider, has challenged small and medium enterprises (SMEs) to re-think their approach...
Read moreSophos has released new insight on an international cryptocurrency trading scam targeting iPhone users through popular dating apps, such as...
Read moreData Gathering gathering on Android handsets is far more extensive than ever realized. According to a study conducted by academics...
Read moreSophos published a new sectoral survey report, “The State of Ransomware in Manufacturing and Production 2021,” that reveals companies in...
Read moreIf you haven’t yet had your online accounts hacked, count yourself lucky. Cybercrime is real; cyber criminals are real; and they’re...
Read moreSophos has published new research, “Fake Pirated Software Serves Up Malware Droppers as a Service,” detailing how droppers for hire...
Read moreZwartTech, a social impact startup that connects businesses with vetted software experts in Africa, has launched a cybersecurity arm to...
Read moreSophos new report dubbed the “State of Ransomware in Retail,” show how retail organizations became a prime target for ransomware...
Read moreStrathmore University has signed a Memorandum of understanding (MOU) with Technology Service Providers of Kenya (TESPOK) in an event held...
Read moreThe whole world is now dependent on the internet & technology and this growth of the internet & technology has...
Read moreSophos today published a new research, “Vigilante Malware Rats Out Software Pirates While Blocking ThePirateBay,” which details a curious cyberattack campaign...
Read moreA major server issue that saw thousands of news, social media and government websites including Bloomberg and the New York...
Read moreBy Peter Mackenzie The Sophos Rapid Response team has compiled a list of the most commonly held security misperceptions they’ve encountered...
Read moreSophos has released the “Active Adversary Playbook 2021,” detailing attacker behaviors and the tools, techniques and procedures (TTPs) that Sophos’...
Read moreCybersecurity firm Sophos has identified a stash of 167 counterfeit Android and iOS apps that attackers are using to steal...
Read moreIn march it was revealed that Facebook was developing Instagram for kids, a move Attorneys general across the Us are...
Read moreIn a new three-part series of articles, Sophos researchers and incident responders unveil what really happens when attackers break into...
Read moreData privacy is always important. When it comes to digitalized data that we share information on the internet, privacy becomes...
Read moreWhile more Kenyans are working from home there have been a lot more cyber crimes and little been done about...
Read moreUS federal agencies have warned companies and government entities against a North Korean hacking group known as Kimsuky. The cybercrime...
Read moreSouth African IT security firm, Afri-ko, has got into a partnership with Korean firm, SecuLetter to supply the latter's products....
Read moreMobile devices have become highly popular nowadays which is the main reason everybody prefers mobile devices over laptops and desktop...
Read moreCISOs and Cybersecurity experts across Africa are set to host a content-rich virtual conference on Cybersecurity on 28th of August...
Read moreWhere on one side, the world is moving towards advancement with the help of technological innovations, the misuse of the...
Read moreWhether it is to purchase goods or services, or apply for a job, one can easily become a victim of...
Read more© 2022 TechMoran Ltd, All Rights Reserved.