A quick look at how and possibly why young Kenyan techies and nerds are turning into black hat hackers and are targeting financial systems and organizations e.g banks. Hint? This problem stems from the lack of job opportunities and security for the youth especially those in the I.T industry.
What is a DDoS Attack? First, we must define the meaning of a DDoS attack. DDoS attacks are a main concern in internet security, and many people misunderstand what exactly they are. A Distributed Denial of Service (DDoS) attack is a malicious attempt to upset typical internet traffic of a targeted server by overwhelming it … Continue reading Top 15 Cyber Attack Maps for Visualizing Incidents
Hey everyone? How are you? Today i would like to touch on security by listing(with links) The Top Open Source Security Tools i personally recommend. Many of these tools can be used by anyone. So let's hop in! Notice: If you are interested in testing these tools they are all available to download and use … Continue reading Top 15 Essential Open Source Security Software and Tools
What is Data Security? is the process of keeping data secure and protected from not only unauthorized access but also corrupted access. The main focus of data security is to make sure that data is safe and away from any destructive forces. Data is stored as rows and columns in its raw form in the … Continue reading Basic Data Security
Bellow are some common tech terms and their meanings. For reference, bookmark this article. More coming soon. 1. Bits and Bytes A bit is a short term of the binary digit where it is the smallest unit of the measurement in computing. As well as, the collection of 8 bits is considered as 1 byte. … Continue reading Tech Terms You Should Know
Hey guys, i am back again with another article, and today i want to touch a bit on Kenya's Cybersecurity issue. Most of us have heard the NEWS, Kenya has a major cybersecurity issue. Kenya has the highest internet penetration in Africa with over 31 million people having access to the internet, according to a … Continue reading Kenya’s Cyber Insecurity