All articles in 'ICT'


The 10 Most Influential Gadgets of All Time

If anyone doubts the role gadgets play in today’s society, that person probably has no idea that at...

5th July 2022
87 Critical Vulnerabilities Discovered in Routers...

When you buy a router, network security should be as much of a priority as data transfer speed and p...

14th June 2022
TunnelSnake: Persistent Threat Secretly Controlin...

Kaspersky researchers have uncovered TunnelSnake, an ongoing advanced persistent threat (APT) campai...

12th May 2021
Cybersecurity: Building a Human Firewall

In Africa, the most common cybersecurity concerns over the past several months have been phishing at...

1st December 2020
37% Of Computers – Servers and Workstations Under...

Regularly conduct security audits to identify and eliminate possible vulnerabilities

10th December 2019
Women Are Underrepresented in Cybersecurity in Hal...

In 45% of enterprises globally, the proportion of women working in IT security departments is less t...

5th November 2019
The Cyberthreat Handbook: Thales and Verint Releas...

This report does not set out to be an exhaustive inventory of cyberattackers but rather to shed ligh...

8th October 2019
How Digital Tech Will Change Old Assumptions about...

Smart IoT technologies, paired with the cloud and AI, will enable companies to think big, grow fast...

24th September 2019
The Role of ICT in Promoting Policy for Inclusive...

ICT now plays a pivotal role in virtually all sectors of the Kenyan economy including finance, healt...

20th August 2019
How Businesses Risk Losing Data

Businesses are putting themselves at increased risk of losing data, by not curbing the actions of cu...

9th July 2019
Connectivity Enables Africa’s Digital Transformati...

Broadband and mobile connectivity growth has had a dynamic impact on Africa.

28th May 2019
Tips For Detecting Hidden Spy Cameras When Travell...

The use of secret cameras to spy on guests in rented accommodation has recently made the headlines,...

28th May 2019
2019 Skills Outlook: Thriving in a Digital World

Rapid digitalisation is transforming what people do in their jobs, how and where they work, and the...

21st May 2019
Luckymouse Group Using Legitimate Certificate to S...

The Kaspersky Lab Global Research and Analysis Team (GReAT) has discovered several infections from a...

11th September 2018
Anti-Theft Feature to Curb Rising Loss of Electron...

Around 23,000 Electronic Devices Go Missing Every Month- Kaspersky Lab

14th August 2018
400 Industrial Companies Attacked With Spear-Phish...

Kaspersky Lab researchers have detected a new wave of financial spear-phishing emails designed to ma...

7th August 2018
Businesses Stuck in a DDoS-Daze as Ineffective Str...

Businesses are falling behind in the race to protect themselves from Distributed Denial of Service (...

10th July 2018
Cybersecurity: Industrial Organisation Pain Points

Many industrial organisations are failing to put practical steps in place, to improve the security o...

3rd July 2018
ICT in the East Africa Community

There cannot be meaningful integration within the Community without effective connectivity across th...

26th June 2018
Africa and the Internet of Things

We are at a watershed moment for Africa as far as the Internet is concerned and it is critical that...

15th May 2018
Cyber Crime: Threats and Counter Measures

As at today, more than 3.7 billion people (54%) are connected globally with Internet economy value i...

6th March 2018
Mobile Technology and Development

We begin – right now, with a tremendous sense of urgency – to rethink in a fundamental way how conne...

6th March 2018
From Crypto Currency Mining to DDos Attacks: The N...

Kaspersky Lab researchers have identified a new intriguing malware with multiple modules, which allo...

16th January 2018
The Journey to Digitalization of Nations

By the end of 2017, close to 3.6 billion people were online. We are likely to cross the threshold fo...

9th January 2018
Bitcoin Stealers Are Back: Hunt for Users’ Cryptos...

Kaspersky Lab researchers have discovered a new malware which steals cryptocurrencies from a user’s...

7th November 2017
Spy Wars: How Nation-State Backed Threat Actors St...

Sophisticated threat actors are actively hacking other attack groups in order to steal victim data,...

9th October 2017
Learning to Live Together: Can Technology Help?

Technology should be integrated into formal education to promote collaboration rather the competitio...

3rd October 2017
Mining Botnets on the Loose

“Mining” Botnets are back - Infecting Thousands of PCs, Generating Hundreds of Thousands of Dollars...

12th September 2017
Protect Your Data Centre

Data centres are often the focus of an attack with important compromised data being sold off to the...

29th August 2017
Governance in the Age of Social Media

The illegal use of digital technologies is a challenge of the 21st century. Cyberspace is increasing...

8th August 2017
Showing page 1 of 3 (86 articles found)

African Perceptions of the Eur...