Recent ransomware attacks define the malware’s new age
History of ransomware Ransomware, a type of malware that holds data for ransom, has been around for years. In 1991,…
History of ransomware Ransomware, a type of malware that holds data for ransom, has been around for years. In 1991,…
There is only one road left to achieving the Sustainable Development Goals (SDGs) set for Africa for 2030 and that’s…
Catholic Relief Services (CRS) has a mission to provide humanitarian relief to people in the developing world. Since 2016, it…
You leave kerosene-soaked rags all around your house. You chain smoke. One day, while relaxing in front of an episode…
While the Internet of Things (IoT) may still be an emerging technology, it is difficult to dispute that it has…
The state of data privacy is a widely discussed topic of conversation. The new EU data protection law is setting…
We’ve all been there. You send a message, you see the recipient has read the message as the two blue…
Uganda has received three High Tech pioneering laboratory machines to speed up the process of testing and treating patients for…
If you think IT decision-makers (ITDMs) are too busy/important/serious to use social media, then we have a surprise for you….
At first glance, the deployment of cybersecurity measures and the pursuit of innovation might seem mutually exclusive. Strategies to enhance…
No more posts available. Thank you for scrolling this far.
No more posts available. Thank you for scrolling this far.