Share
The Ghana Cybersecurity Authority granted licences and accreditation to 51 cybersecurity industry players to to combat surge in data breaches
This adds to the rising count of South African entities that have seen cyber attackers come for their data
On high-performing teams, compliance is not solely the responsibility of a dedicated department; rather, it is a shared responsibility integrated into the team's workflows and decision-making processes.
In Q2 2023, the region experienced the highest average of cyberattacks per week per organization
Inside: The crackdown on starlink in Zimbabwe and why Moderna is halting vaccine plant project in Kenya
According to NDIC, the number of POS and mobile fraud cases increased by 19.51% in the first quarter of 2023. This is likely due to the growing popularity of these payment methods in Nigeria.
Can the Nigerian government shut down the internet? How feasible is it? How do you bypass internet restriction or shut down? Here is all you need to know.
Spyware is hard to define because we are yet to agree on what constitutes "consent" and "harm". Regardless, here are 6 ways to guide against Spyware.
In this article, I point out how you can make money from cryptocurrencies, and how to avoid getting scammed. For the purpose of this article, I focus on Bitcoin as it is the most popular and the largest cryptocurrency by market volume and value.
Predictive Analytics and Ethical Concerns Managing your digital footprints Digital footprint refers to a trail of activities online or via electronic media
Personal computers contain a trove of personal and sensitive information, which make them a valuable target for hackers. Here are 7 steps to improve the security of our personal computers.
Smartphones like other computing devices contain a lot of important and sensitive information, this makes them appealing to hackers and criminals.
Get a weekly newsletter roundup on African Tech