Digital Privacy
Several recent events like the enactment of the EU GDPR, 2018, Data Protection Act, 2019, and other Data Privacy Laws that have been passed...
Apple rejects Kenya push to unlock mystery iPhone
US tech giant Apple rejected a request by the Kenyan government to unlock two iPhones that were the subject of police investigations...
Most Common Hacking Techniques
What Are Top 10 Common Hacking Techniques?
PhishingDenial of Service Waterhole attacksFake WAPEavesdroppingKeyloggingVirus, TrojanClick JackingCookie theftBait & switch
Coronavirus: 10 Cybersecurity Safety Tips While Working from Home
Amid the Covid-19 (Coronavirus) pandemic, there has been a disruption in normal business operations across all industries. As a result, employees are...
Tips to make your WordPress site secure.
WordPress
is the most popular Content Management System (CMS) and powers more than 30% websites.
However as it grows, hackers have taken note and...
Women in Cybersecurity Awards Africa 2020
The inaugural Women in Cybersecurity Awards Africa 2020 (WICA Africa) is the first of its kind award to honor cybersecurity professionals...
10 Anonymity Rules
Use Tor (Encrypted Browser, Proxy and Protocol)Use Tails (Secure OS)Use Signal (Secure Messaging App)Use Burner EmailsUse a VPN (A Non Logging...
Metadata: Data About Data/Information
Hey guys, how are you doing?
Today i would like to touch on Metadata.
What is...
KENYA’S JOURNEY TO PROTECT CITIZENS ONLINE IS ONLY JUST BEGINNING.
by Alice Munyua
Kenya has joined the list of fewer than 30 African countries in enacting Data...
Tech for Public Good: Should Public worry for personal data and privacy in Kigali?
Collection, handling and sharing of data public
information continue to dividing opinions as government embark on tapping into
ICT solutions to ensuring safety.