
Security




How to remove the ‘Not Secure’ Warning on Google Chrome
Chrome 68 has been released and it's the first release that displays a 'Not secure' message in the address bar on HTTP pages. What seemed like a threatening warning has eventually come to pass and all non-secure pages are deemed to be shamed. This ‘Not Secure' warning,... Read More

Advertisement




Several Kenyan Government websites hacked by “The Kurdish hackers”
In a rather embarrassing development for the Kenyan Government, a group of hackers calling themselves The Kurdish hackers - W4r10k, have managed to intrude several State websites and leaving a series of incomprehensible text on sites. The Ministry of ICT Cyber Security team was on... Read More

How to use the Google Password Checkup extension to keep your accounts secure
Keeping your online accounts secure is very vital in maintaining good online privacy. Google's Chrome extension Password Checkup aims to ensure that your password is never compromised without your knowledge. Password Checkup checks your username and password against a database of exposed login credentials. Once it detects... Read More

Advertisement



Front, Side or Rear? What’s the best position for the fingerprint scanner?
Authentication is one aspect of devices in the smartphone ecosystem that has undergone series of evolution within a short period of time. Formerly, when smartphone authentication was mentioned, (alphanumeric) passwords, PINs, and Patterns were the dominant trio. Now, biometric authentication is the in-vogue method of... Read More




Advertisement

WEP, WPA2 & WPA3: A brief guide to WiFi security
As a rule of thumb, whenever you connect to a Wi-Fi network using a password, variations of the following Wi-Fi security protocols come into play: WEP, WPA, & WPA2. The acronyms WEP, WPA, and WPA2 represent generations of Wi-Fi security protocols present on most if not... Read More

New Malware appears to be picking hidden commands from Twitter Meme.
Security researchers Trend Micro have discovered a Malware that was picking it's commands from a Twitter Meme. An unknown hacker who is also the creator of the Malware used Twitter and the 'What if I told you meme' to secretly tell a windows based Malware... Read More




Complete Guide to Smartphone Biometric Authentication (Fingerprint, Iris, Voice, Face)
Smartphones have, over the years, become a very important aspect of our lives. Its use has transgressed from basic communication (calling, texting, etc.) to our everyday work and personal lives. Nowadays, the average smartphone user stores personal files, multimedia, and other documents — banking details,... Read More


Advertisement



Titan security key is Google’s latest way of securing user data
Phishing, hacking and other online attacks are growing in sophistication that it has become easy to manipulate two-factor authentication (2FA) methods. Websites that masquerade as legitimate login portals can steal 2FA keys. With almost half of all account breaches attributable to phishing, and password theft,... Read More

Aloha is a mobile browser with a Free unlimited VPN
VPN apps are great. You can get to access restricted websites, apps and content in your region and get the benefit of better security and privacy. But using a VPN for the whole phone also means slightly reduced speeds and somewhat increased data usage. Wouldn't... Read More
Advertisement
Advertisement