Buy Inverter, Generators, Automotive on Konga
Buy Inverter, Generators, Automotive on Konga
Home Tags Mobile Security

Tag: Mobile Security

All about Mobile Security. Tips and Guides for securing your Mobile Phones, Tablets, Wearables, IoT Devices, and 2-in-1 Hybrid Tablets/Laptops

Top Security Concerns for IoT-Enabled Devices

Top Security Concerns for IoT-Enabled Devices

Internet of Things or IoT, as it is commonly referred to, is the most advanced form of internet connectivity. IoT allows smart devices to connect to the internet and enables them to act independently and exchange data with each other. As technology is becoming more and more advanced, IoT has...
Jumia Apple Store - iPhone X Smartphone with iPhone 8 and iPhone 8 Plus

Here’s how you can keep your iPhone safe with these tips

When it comes to phone the first thing we look for is security. Security is the first concern people have and everyone wants to keep their data and information protected. Apple has ensured to keep security in mind before designing any software update. Apple looks into this matter deeply...
Data Breach

Suffered a Company Data Breach? 7 Initial Steps to Take

Most small business owners are under the mistaken impression that data breaches and cyber attacks are directed only at large corporate giants such as Google, Target, Citibank, and Anthem to name a few. However, Small Business Trendz reports that 43% of cybercrime targets small businesses. Further, 60% of businesses...
Wannacry Ransomware

Ransomware: What you should know about them

The recent WannaCry cyber attack that targeted Microsoft Windows operating system infecting over 200,000 computers in over 150 countries, has drawn greater attention to ransomware and software security in general. So what is ransomware and what should you know about it? Read on! About Ransomware Ransomware is a type of malware...
CyberXchange Hackathon 2016

Cyber criminals are out there. What are you doing about it?

Every 5 seconds there is a case of cyber crime, and this poses a threat to individuals and most especially organizations. Let’s build immunity, join the biggest holistic cyber security event in West Africa. The CyberXchange Conference 2016 which will hold at the Landmark Event Centre, Lekki Peninsula, Lagos on...
CyberXchange Hackathon 2016

CyberXchange Conference 2016: Collaborating to Strengthen Cyber Security in West Africa

The number one topic for CEOs this year is cyber security as well as keeping company and client ecosystems safe. Security issues are even more pronounced with the slump in oil prices causing economic downturns in resource rich countries and in turn spurring an accelerated uptick in cyber criminal...
CyberXchange Hackathon 2016

CyberXchange Hackathon Registration ends in Three Days

Hey guys, do you know that registration for the largest CyberXchange Hackathon in Africa ends in three days? The pre-qualifier registration for the hackathon closes August 30, 2016, which is just 3 days away. The competition which is sponsored by Facebook, will bring undergraduates and early IT professionals together for a...
CyberXchange Hackathon 2016

Register for CyberXchange Hackathon Sponsored by Facebook to Win Amazing Prizes

Clear your calendar - It's going down! First ever CyberXchange Hackathon sponsored by Facebook to touch Nigerian soil. Come not just by yourself but with your team to compete against other university and young professionals with less than 2 years experience throughout Nigeria. The pre-qualifier registration closes August 30,...

AVG Antivirus 2014 – Secure your PC

AVG Technologies has launched the 2014 edition of its award winning Antivirus software. AVG Antivirus 2014 comes with a feature that enables you delete files completely without leaving traces on your hard drive. The new AVG antivirus has also added a feature for encrypting your files, keeping it secure...

Android Vulnerability – 99% of Android Devices Could be Affected

Last week, Bluebox Security, a security firm, uncovered a 4 year old vulnerability in Android's security system. According to Bluebox, the vulnerability allows a hacker to modify the APK code of an Android application without breaking its cryptographic signature, making its potential harm undetectable by the Android security and...