Posts Tagged ‘cybersecurity’
What is the difference between Sophos Firewall rules and NAT rules
Sophos Firewall device has two types of rules: the firewall rules and NAT (Network Address Translation) rules. Here’s a brief explanation of the difference between these two types of rules
Read More11 Free Information Technology Certifications
FreeCodeCamps offers 11 free information technology certifications that have helped over 40,000 developers get a job
Read MoreFacts about TLS 1.0 and SSL
Transport Layer Security (TLS), the successor of the now-deprecated Secure Sockets Layer (SSL), is a cryptographic protocol designed to provide communications security over a computer network. It’s Dangerous to Use Outdated TLS Security Protocols TLS 1.0 was first defined in RFC 2246 in January 1999 as an upgrade of SSL Version 3.0, and written by Christopher Allen and Tim Dierks of Consensus Development.…
Read MoreWhose Zambian phone number is on the Pegasus spyware list?
With over 50, 000 mobile numbers claimed all over the world to be on NSO spyware software whose Zambian phone number is on the Pegasus Project Data? The quick answer is – Is Pegasus spyware even here in Zambia? This information technology content is localized and part of Lensesview simple review updates about world technology…
Read MoreCyber Issues Affecting Africa
Just last week an African Union cybersecurity group listed serious cyber issues affecting Africa and on top of the list was the vital role of mobile technology, software issues, signaling, and the users themselves. This was in a Zoom Webinar organized by the African Union Commission “Webinar on Cybersecurity in Africa: Rising for the new…
Read MoreTwo out of three organizations fell victim to a cyberattack in 2018
Two out of three organizations fell victim to a cyberattack in 2018 shows results of an independent survey of 3,100 IT managers commissioned by Sophos. Cybersecurity just isn’t getting any easier. While protection technologies continue to advance at a rapid pace, so do the cybercriminals trying to circumvent them. At the same time, the growing…
Read MoreMicrosoft and Google Collect Too Much Data About You
According to the Infographic from Securitybaron.com Microsoft and Google are the big players collecting massive data about their users. Have you ever wondered just how much data Google has on you? The results are quite disturbing. While Facebook collects data with demographic path Amazon is more interested in the ability to track your government ID…
Read MoreHow to Tell Your Facebook Account Was Hacked
Over the weekend a work college sent me a message through WhatsApp. He took a screenshot of a notice from Facebook categorically telling him that his Facebook (Alex) Account was compromised in the recent Facebook hack. I don’t know how many Zambian users have been affected apart from the above mentioned or Facebook is still…
Read MoreGoogle Chrome 70 Major Features
Google Chrome 70 will bring a lot of major changes to the browser that may see some websites shutting down or inaccessible. Thousands of sites may go down because of using distrusted website security certificates. ———————————————————————————————————- Read More on Similar Issues Here is a list of websites likely to go down List Of Zambian Websites…
Read MoreEmbrace Chinese Technology With Caution
Nury Turkel of the Uighur Human Rights Project told BBC Hardtalk’s Shaun Ley: “I am afraid of mass murder because we don’t know, other than a few individuals have managed to leave the camps. People are not leaving. Where have those million people gone? What are they being charged of?” China has millions of its…
Read More