PC Tech Magazine PC Tech Magazine
  • News
    • Artificial Intelligence
    • Banking
    • Entrepreneurs
    • Innovation
    • Partnerships
    • Technology
    • Telecoms
    • Startups
    • Social Media
  • Interviews
  • OP-ED
  • Editorial
  • National
  • Reviews
  • Pictorial
Facebook X Instagram Youtube
PC Tech Magazine PC Tech Magazine
PC Tech Magazine PC Tech Magazine
  • News
    • Artificial Intelligence
    • Banking
    • Entrepreneurs
    • Innovation
    • Partnerships
    • Technology
    • Telecoms
    • Startups
    • Social Media
  • Interviews
  • OP-ED
  • Editorial
  • National
  • Reviews
  • Pictorial
Follow Us
Follow Us
Facebook X Instagram Youtube
PC Tech Magazine PC Tech Magazine
Facebook X Instagram Youtube
  • Web Summit Africa 2026

Cyber Attacks

21 posts
cyber-security. (Photo Courtesy) cyber-security. (Photo Courtesy)
  • East Africa
  • National
  • News
  • News Archive
  • Privacy
  • Security

Governments and Telecoms Top Targeted Sectors for Cyber Attacks in East Africa

byEphraim Batambuze III
June 24, 2016
Image Credit: blogs.dlt.com Image Credit: blogs.dlt.com
  • International
  • Internet
  • Research

Hackers Could Get Even Nastier in 2018 – McAfee Researchers

byStaff Writer
December 1, 2017
Free public Wi-Fi are often unsecured which is relatively easy for hackers to access your device and vital information. (Photo by rawpixel.com from Pexels) Free public Wi-Fi are often unsecured which is relatively easy for hackers to access your device and vital information. (Photo by rawpixel.com from Pexels)
  • Internet
  • Privacy
  • Security
  • Technology

Techniques Hackers Employ to Exploit Public Wi-Fi and Compromise Your Sensitive Data

byJoan Banura
February 16, 2024
A hacker in a dark room with a covered face typing away at a computer trying to steal personal information or hack into a system is a cybersecurity threat. PHOTO: Nahel Abdul Hadi/Unsplash A hacker in a dark room with a covered face typing away at a computer trying to steal personal information or hack into a system is a cybersecurity threat. PHOTO: Nahel Abdul Hadi/Unsplash
  • Featured
  • News
  • Security
  • Technology

Kaspersky: 411,000 Malicious Files Were Unleashed Daily in 2023

byJoan Banura
December 31, 2023
Anna Collard, SVP Content Strategy and Evangelist at KnowBe4 AFRICA. Anna Collard, SVP Content Strategy and Evangelist at KnowBe4 AFRICA.
  • News
  • Privacy
  • Security

Cybercriminal For Hire: The Rise of Ransomware-as-a-Service

byJoan Banura
December 13, 2023
Hackers are always looking out for innovative methods to breach even the most sophisticated security infrastructure. (PHOTO: Clint Patterson | Unsplash) Hackers are always looking out for innovative methods to breach even the most sophisticated security infrastructure. (PHOTO: Clint Patterson | Unsplash)
  • Columns
  • Editor's Pick
  • Features
  • Security
  • Technology

An Essential Guide: Improving Cyber-Resilience to Combat Cyber Attacks

byNathan Ernest Olupot
June 14, 2022
Image Credit: CNET Image Credit: CNET
  • Netflix
  • News
  • Social Media

OurMine Hacks Netflix’s Twitter Account

byNathan Ernest Olupot
December 22, 2016
Twitter’s notice is the latest amid concern about cyber attacks by state-sponsored organizations. Image Credit: ibnlive Twitter’s notice is the latest amid concern about cyber attacks by state-sponsored organizations. Image Credit: ibnlive
  • News
  • Social Media
  • Technology

Twitter warns some users of possible state-sponsored cyber attack

byPC Tech
December 14, 2015
WannaCry Ransoware. (Photo Credit: Quartz) WannaCry Ransoware. (Photo Credit: Quartz)
  • Internet
  • News
  • Security

WannaCry Ransomware: Newly Discovered Vulnerability Raises Fear of More Cyber-Attacks

byStaff Writer
May 25, 2017
The mysterious creator of Bitcoin could be an Australian businessman. Image Credit: BBC The mysterious creator of Bitcoin could be an Australian businessman. Image Credit: BBC
  • Cryptocurrency
  • Internet
  • News
  • Security

JUST IN: Hackers Steal Bitcoin Funds From Bithumb Exchange Traders

byNathan Ernest Olupot
July 5, 2017
Stanbic Bank supa dupa and pamoja.

Top News

  • Cybersecurity breaches can lead to devastating consequences, and damage to a company's reputation. IMAGE: Freepix
    Rwanda Launches Pan-African Cybersecurity Community (ICCA)
  • Kenya’s “Seven-Second” Standoff: Tech Communities Decry New Live Broadcast Mandate
  • Ghana_E-wasteland
    Waste Removal Strategies for Fast-Paced Renovation Projects
  • Navigating the Digital Frontier: The Evolution and Future of Online Casinos
  • How to Edit PDF Text Online Without Signup, login and limits
  • SEO in simple terms is a process of improving your website by using a variation of SEO tools to increase your visibility for relevant searches in multiple search engines out there. (Photo by: Diggity Marketing)
    Budget-Friendly SEO Tools Group Buy Packages
  • Preparing Your Home for Hurricanes With a Simple Checklist
  • Why Chip Shortages Persist in 2026—and 4 Procurement Tactics Tech Startups Can Control
  • Fiber poles for different ISP along Ismael Road, Mbuya. PHOTO: PC Tech Magazine
    Ending the “Pole Chaos”: UCC Orders Telecoms to Coordinate Fibre Deployment
  • How Leading Law Firms Support Their Employees

See Also

  • Artificial Intelligence
    AI Startup Insurance Coverage: Risks and Policies
    by Staff Writer
    March 24, 2026
  • Artificial Intelligence
    5 Best AI Video Tools for Cinematic Storytelling
    by Staff Writer
    March 23, 2026
  • Man ordering groceries online. PHOTO: Freepik
    Artificial Intelligence
    Inside the AI Systems That Catch Fake Clicks in Real Time
    by Staff Writer
    March 19, 2026
  • PHOTO: Freepik
    Artificial Intelligence
    How Artificial Intelligence Is Transforming Government Operations
    by Staff Writer
    March 17, 2026
  • Artificial Intelligence
    From Raw Data to Insights: Why Every Lake AI Company Needs a Scalable Data Strategy
    by Staff Writer
    March 13, 2026
  • Cryptocurrency
    Reasons Cryptocurrency Has Become So Popular
    by PC Tech
    February 19, 2026
  • COURTESY PHOTO
    Cryptocurrency
    How Do You Start Playing at a Crypto Casino for the First Time
    by PC Tech
    January 5, 2026
  • PHOTO: DC Studio
    How Artificial Intelligence is Reshaping the Modern Gaming Experience
    by Fawad Mohsin
    December 27, 2025
  • A collection of cryptocurrencies. COURTESY PHOTO
    2026 Outlook: From Crypto Experimentation to Financial Integration and Maturation
    by Columnists
    December 18, 2025
  • Abdul Samad, Crypto Trader & Content Creator.
    Luno, AltSchool Africa Launch Crypto Education Programme for Nigerians
    by PC Tech
    December 16, 2025
PC Tech Magazine PC Tech Magazine
© 2025 PC Tech Magazine. All Rights Reserved.
  • About Us
  • Contact Us
  • Advertise
  • Write a Review
Facebook X Instagram Youtube