networking

Simple Exploit Allows Attackers to Modify Email Content Even After It's Sent

Security researchers are warning of a new, easy-to-exploit email trick that could allow an attacker to turn a seemingly benign email into a malicious one after it has already been delivered to your email inbox. Dubbed Ropemaker (stands for Remotely Originated Post-delivery Email Manipulation Attacks Keeping Email Risky), the trick was uncovered by Francisco Ribeiro, the researcher at email and cloud security firm Mimecast. A successful exploitation of the Ropemaker attack could allow an

Closing the Skill Gap For The Internet Of Things Opportunities.

When I was writing down my thoughts on this topic, a friend came in and on looking at my screen asked “What is IoT”, I replied “Internet of Things”. He said “You mean everything having internet”, I smiled and answered “Yes”. He went further to define Internet of Things (IoT) as everything that has internet. What is IoT The Internet of Things (IoT) is the network of physical objects or “things”

Five Reasons Human Firewalls Are The Best Defense Against Cyber-Attacks

There is no such thing as perfect security. We know this to be painfully true as new data breaches make the news every other day. Maybe, in the future, technological advances will pave the way to penetration-proof firewalls that block every threat, but we seriously doubt that day will come anytime soon, if ever. In the meantime, the first line of defense continues to be humans. Whether at work, at

How to Prevent Webcam Peeping

Having internet access and a computer screen is what allows you to be anonymous. If a cyber criminal is able to hack into your computer’s camera your anonymity is lost. While being afraid of people spying on you via a webcam may make you sound like a conspiracy theorist, it is actually a real threat. So how are people hacking each other’s webcams? What do they get out of it

Your Kids Vs Technology – How TheOneSpy could have prevented it

Your Kids Vs Technology – How TheOneSpy could have prevented it. There is nothing more upsetting to parents than to see their kids in turmoil or distress. However, regardless of putting maximum efforts in protecting kids, there is only so much a parent can actually do. Occasionally, the issue becomes obsessively great and there is not much that can be done. But why should one let it get that far?

Nigerian SMEs Should Leverage Technology Potentials_ Microsoft Team

Microsoft Nigeria recently in a meeting in Lagos, Nigeria says Small and Medium Enterprises must leverage technology to survive the current economic challenges facing Nigeria. Mr Christopher Ahonsi, Customer Immersion Experience Lead, Microsoft Nigeria, spoke on the sidelines of the Annual SME Forum 2016 organised by BusinessDay Media Ltd in Lagos that technology will help SMEs to cut cost of running their business, while still maintaining the quality and efficiency of