In the recent times, we have seen many disruptions. We are threatened in terms of our jobs. There is a war between man vs machine, man vs Internet of things, man vs artificial intelligence. Initially, the first war was man vs computer. People fought computers. However, you can’t fight with the future reality and win.
How are regional Civil Aviation Authorities in East Africa, including our own CAA secured to guard against such cyber attacks on air crafts? Next time you are on a flight, just know any thing is possible. A hacker could take control of your aeroplane and divert your trip or cause more complications. This is not to
If you own a Samsung Galaxy Phone – S6, S6 Edge or Note 4, in particular – there are chances that a skilled hacker could remotely intercept your voice calls to listen in and even record all your voice conversations. Two security researchers, Daniel Komaromy of San Francisco and Nico Golde of Berlin, have demonstrated exactly the same during a security conference in Tokyo.
A facebook sponsored study has shown the number of internet users globally has grown significantly to 3.2 billion by the end of 2015. According to Facebook’s second annual “State of Connectivity” report, released late Sunday, 200 million people gained Internet access in 2015, due to “more affordable data and rising global incomes.” The report however
NIST identifies 65 challenges that forensic investigators face in gathering and analyzing digital information stored in the cloud, seeks help developing standards to aid law enforcement. Government Data + Maps: 10 Great Examples The National Institute of Standards and Technology has released a draft report for public comment that sets forth the daunting challenges forensic