How to check, secure your email addresses if they have been breached
The Have I Been Pwned? (HIBP) website has revealed another huge cache of breached email addresses and passwords discovered last week circulating among…
Blogs on tech trends, products, services and technologies, including cloud computing, security, artificial intelligence and more
The Have I Been Pwned? (HIBP) website has revealed another huge cache of breached email addresses and passwords discovered last week circulating among…
In 2013, the Global Co-working Census pointed out that there were only 24 co-working spaces in Africa. By 2015 there…
Bitcoin concept was conceived barely a decade ago, and it remains as one of the most misunderstood yet widely known…
I have spent 14 years traveling all over the East and larger Africa, pitching various technologies to customers. During the…
The past year has been extremely eventful in terms of the digital threats faced by financial institutions: cybercrime groups have…
M-PESA, one might argue, is Safaricom’s biggest product to date, and a product that impacts Kenya’s economy greatly. In 2013,…
The next-generation mobile network and fast data transmission solutions can be used to collect a huge amount of data on…
In recent years, the quality in artificial intelligence-driven transcription services has improved considerably. Between 2016-2017, Microsoft reported it had reduced its error…
Instead of using mass spamming techniques to blast malware to millions of recipients in the hope of collecting thousands of…
Digital transformation is the transformation of business and organizational activities to fully leverage the changes and opportunities of a mix…
No more posts available. Thank you for scrolling this far.
No more posts available. Thank you for scrolling this far.