Chinese Spyware Pre-Installed on All Samsung Phones (& Tablets)
Chinese Spyware Pre-Installed on All Samsung Phones (& Tablets) The reddit user throws light on the Samsung’s involvement with Qihoo 360, I know the title is rather sensational, however it couldn’t...
View ArticleWhy CEO’s Shouldn’t Ignore the Human Factor in Cyber Security in Kenya
Why CEO’s Shouldn’t Ignore the Human Factor in Cyber Security in Kenya In this era and with the world COVID pandemic, the majority of CEO’s are still taking cyber security requirements too lightly...
View ArticleCyber Attacks Protection
How to Protect Your Organization Against Cyber Attacks? Witnessing the extent of damage cyber attacks can cause should be reason enough to take the necessary preventive measures right away. So, here...
View Article9 Reasons Digital Fraud Is On The Rise
9 Reasons Digital Fraud Is On The Rise. What Is Digital Fraud? Digital fraud is when criminals try to use email, websites, malicious software or other methods to learn your personal details or trick...
View Article6 Ways to Protect Yourself From Hackers
6 Ways to Protect Yourself From Hackers All the information on your phone or devices could be easily be made available to hackers in the area, unless you’ve taken steps to secure and protect your data....
View ArticleHacking Techniques
Top 10 Common Hacking Techniques You Should Know About Below are some of the hacking techniques that are commonly used to get your personal information in an unauthorized way. 1.ClickJacking Attacks:...
View ArticleData expert helping trace data crime
Data expert helping trace data crime On many occasions during tense court proceedings for a Data Crime Related case, George Njoroge, the CEO of East Africa Data Handlers, has felt like punching the air...
View ArticleSNEAK PEAK INTO BUSINESS EMAIL COMPROMISE ATTACKS
SNEAK PEAK INTO BUSINESS EMAIL COMPROMISE ATTACKS EAST AFRICAN DATA HANDLERS : Cyber Security Awareness Business email compromise (BEC) is a type of email cybercrime scam in which an attacker targets...
View ArticleHackers in Kenya
Debunking Myths about Hackers in Kenya Introduction: Understanding the Reality of Hackers in Kenya Kenyan hackers, hacking community in Kenya, cybercrime in Kenya, cyber security landscape in Kenya...
View ArticleData Protection Services
Data Protection Services: Safeguarding Your Most Valuable Asset Who needs these services In today’s interconnected world, data is more than just information, it’s the lifeblood of your organization....
View Article
More Pages to Explore .....