Want to see “blue tick” message receipts while hiding your own? There’s an app for that
We’ve all been there. You send a message, you see the recipient has read the message as the two blue…
We’ve all been there. You send a message, you see the recipient has read the message as the two blue…
Uganda has received three High Tech pioneering laboratory machines to speed up the process of testing and treating patients for…
If you think IT decision-makers (ITDMs) are too busy/important/serious to use social media, then we have a surprise for you….
At first glance, the deployment of cybersecurity measures and the pursuit of innovation might seem mutually exclusive. Strategies to enhance…
Data governance definition Data governance is a system for defining who within an organization has authority and control over data…
Phishing definition Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the…
In the early days of artificial intelligence, computer scientists attempted to recreate aspects of the human mind in the computer….
RobbinHood ransomware comes with both a vulnerable driver and a malicious driver that has the sole purpose of taking out…
Automation and other technological advancements have transformed the way we work and also how we secure it, but with cyber…
Africa’s technology start-up scene is vibrant – and growing fast. There are currently over 640 active technology hubs across the…
No more posts available. Thank you for scrolling this far.
No more posts available. Thank you for scrolling this far.