Solomon Komen

November 16, 2017
agriculture and infosec

How Cyber Security and Design thinking can be leveraged to enhance food security

How can we apply Business Processes Automation (BPA) and Cyber Security to ensure food security and solve major problems faced by young farmers, new farmers, large […]
September 7, 2017
Online Reputation

Data Privacy: Mind your online reputation

Internet provides an opportunity for all to learn new things, do business, connect with interesting people, contribute on trending topics and to be part of good […]
July 17, 2017
truecaller scam report 3

Kenya among top 20 countries hit by spam calls

Kenya is on the top 20 list of countries most affected by spam calls, a majority of which are originated by fraudsters, caller ID application TrueCaller […]
May 16, 2017
wannacry ransomware

7 Easy Steps to Protect Yourself Against WannaCry Ransomware Attack

Currently, there is no WannaCry decryption tool or any other solution available, so users are strongly advised to follow prevention measures in order to protect themselves. […]
April 19, 2017
IMG_0442

Important Features to look for in an Antivirus

A PC without an antivirus installed and running will likely be infected within minutes of connecting to the internet. An ounce of prevention beats a pound […]
February 20, 2017
android lockscreen

Your android pattern can be unlocked in just five steps by attackers, report

If you have an android phone you must be feeling pretty secure with its best feature, the pattern lock. The pattern lock system is used among […]
February 17, 2017
whatsapp web

Someone Could Be Spying on Your WhatsAPP Messages From Their Computer Somewhere

WhatsApp is now accessible both on your phone and your computer and someone could be reading and even be seated somewhere responding to your WhatsApp messages […]
February 13, 2017
MacOS Word Macro Malware

First-Ever Word Macro Malware for Apple Mac OS Discovered

After targeting Windows-based computers over the past few years, hackers are now shifting their interest to Macs as well. The emergence of the first macro-based Word […]
February 3, 2017
Hackers pay employees

Hackers Now Offering Money to Company Insiders in Return for Confidential Data

Besides selling their company’s secret information, researchers also found evidence of rogue staff, in some cases, even working with hackers to infect their company networks with […]
February 1, 2017
Bunifu Mobile Security user scrolling his phone.

Mobile Security: Threats and Consequences

Without doubt, mobile devices, especially smartphones have become our best friends. We use them to make calls, take photos, shop online, bank, store personal or office […]