In the early years of 2010, we were always subjected to romance scams, via social media and text messages, forming an emotional connection, and eventually, the scammer plays on our emotions and persuades us to give out personal information like bank information or retirement accounts. With the gain of power in the internet of things
Passwords at times fail to fulfill the intended purpose of authenticating users because password strength may not be given due consideration. A password is deemed strong if it is hard to guess, that is, not a dictionary word or personally identifiable, and is a good long string made of combination of numbers, letters and special
All the time, we are requested to update our mobile applications such as Twitter, Facebook, Whatsapp, etc. but we often don’t check out the authenticity of the updates and persons who upload these updates! A powerful Android remote access tool (RAT) family dubbed RATA is proliferating, with at least 20 different variants cropping up since
First Appeared in TODAY’S Accountant The Magazine for The Institute of Certified Public Accountants of Uganda (ICPAU) ISSUE 19, AUGUST 2019 pg. 44 He posted a WhatsApp message to a lady friend: “Here is the company’s payroll. Treat as confidential. Love you!” The lady immediately forwarded to another friend. “These guys are ripping us off.
Qn. I am an insurance practitioner? Why should I participate or sponsor the 3rd annual cybersecurity and risk management conference? A: Insurance sells a promise and relies on trust. The industry has also undergone a tremendous change in the way the business is conducted from risk assessment and underwriting to onboarding, service delivery, and on-going