PC Tech Magazine PC Tech Magazine
  • News
    • Artificial Intelligence
    • Banking
    • Entrepreneurs
    • Innovation
    • Partnerships
    • Technology
    • Telecoms
    • Startups
    • Social Media
  • Interviews
  • OP-ED
  • Editorial
  • National
  • Reviews
  • Pictorial
Facebook X Instagram Youtube
PC Tech Magazine PC Tech Magazine
PC Tech Magazine PC Tech Magazine
  • News
    • Artificial Intelligence
    • Banking
    • Entrepreneurs
    • Innovation
    • Partnerships
    • Technology
    • Telecoms
    • Startups
    • Social Media
  • Interviews
  • OP-ED
  • Editorial
  • National
  • Reviews
  • Pictorial
Follow Us
Follow Us
Facebook X Instagram Youtube
PC Tech Magazine PC Tech Magazine
Facebook X Instagram Youtube
  • Mastercard Foundation EdTech Fellowship 2026
  • Africa Tech Summit London 2026
  • Web Summit Africa 2026

Cyber Attacks

21 posts
cyber-security. (Photo Courtesy) cyber-security. (Photo Courtesy)
  • East Africa
  • National
  • News
  • News Archive
  • Privacy
  • Security

Governments and Telecoms Top Targeted Sectors for Cyber Attacks in East Africa

byEphraim Batambuze III
June 24, 2016
Image Credit: blogs.dlt.com Image Credit: blogs.dlt.com
  • International
  • Internet
  • Research

Hackers Could Get Even Nastier in 2018 – McAfee Researchers

byStaff Writer
December 1, 2017
Free public Wi-Fi are often unsecured which is relatively easy for hackers to access your device and vital information. (Photo by rawpixel.com from Pexels) Free public Wi-Fi are often unsecured which is relatively easy for hackers to access your device and vital information. (Photo by rawpixel.com from Pexels)
  • Internet
  • Privacy
  • Security
  • Technology

Techniques Hackers Employ to Exploit Public Wi-Fi and Compromise Your Sensitive Data

byJoan Banura
February 16, 2024
A hacker in a dark room with a covered face typing away at a computer trying to steal personal information or hack into a system is a cybersecurity threat. PHOTO: Nahel Abdul Hadi/Unsplash A hacker in a dark room with a covered face typing away at a computer trying to steal personal information or hack into a system is a cybersecurity threat. PHOTO: Nahel Abdul Hadi/Unsplash
  • Featured
  • News
  • Security
  • Technology

Kaspersky: 411,000 Malicious Files Were Unleashed Daily in 2023

byJoan Banura
December 31, 2023
Anna Collard, SVP Content Strategy and Evangelist at KnowBe4 AFRICA. Anna Collard, SVP Content Strategy and Evangelist at KnowBe4 AFRICA.
  • News
  • Privacy
  • Security

Cybercriminal For Hire: The Rise of Ransomware-as-a-Service

byJoan Banura
December 13, 2023
Hackers are always looking out for innovative methods to breach even the most sophisticated security infrastructure. (PHOTO: Clint Patterson | Unsplash) Hackers are always looking out for innovative methods to breach even the most sophisticated security infrastructure. (PHOTO: Clint Patterson | Unsplash)
  • Columns
  • Editor's Pick
  • Features
  • Security
  • Technology

An Essential Guide: Improving Cyber-Resilience to Combat Cyber Attacks

byNathan Ernest Olupot
June 14, 2022
Image Credit: CNET Image Credit: CNET
  • Netflix
  • News
  • Social Media

OurMine Hacks Netflix’s Twitter Account

byNathan Ernest Olupot
December 22, 2016
Twitter’s notice is the latest amid concern about cyber attacks by state-sponsored organizations. Image Credit: ibnlive Twitter’s notice is the latest amid concern about cyber attacks by state-sponsored organizations. Image Credit: ibnlive
  • News
  • Social Media
  • Technology

Twitter warns some users of possible state-sponsored cyber attack

byPC Tech
December 14, 2015
WannaCry Ransoware. (Photo Credit: Quartz) WannaCry Ransoware. (Photo Credit: Quartz)
  • Internet
  • News
  • Security

WannaCry Ransomware: Newly Discovered Vulnerability Raises Fear of More Cyber-Attacks

byStaff Writer
May 25, 2017
The mysterious creator of Bitcoin could be an Australian businessman. Image Credit: BBC The mysterious creator of Bitcoin could be an Australian businessman. Image Credit: BBC
  • Cryptocurrency
  • Internet
  • News
  • Security

JUST IN: Hackers Steal Bitcoin Funds From Bithumb Exchange Traders

byNathan Ernest Olupot
July 5, 2017

Top News

  • Mass Production vs Custom Manufacturing: Which One Wins in 2026?
  • A 3D architectural visualization of a house. COURTESY IMAGE
    How to Present a Property That Doesn’t Exist Yet
  • How much does it cost to tow a car?
    How much does it cost to tow a car?
  • 5 Best Book Printing Companies for Professional Publishing Projects
  • From Office Rentals to Studio Living: How Space Needs Are Evolving Across Growing Cities
  • How Contractor Management Systems Help Prevent Workplace Accidents
  • How Can Glass Awards Improve Corporate Recognition Programs?
  • Trading Psychology and Emotional Control for Success
  • Why AI-Powered Custom Applications Are Replacing SaaS for Enterprise Workflows
    What Technology Skills Do Young Professionals Need to Succeed?
  • Teddy Ruge, Co-founder of Hive Colab present the preliminary findings from their upcoming EdTech Baseline Study, during the launch of the Mastercard Foundation EdTech Fellowship in Uganda. PHOTO: Hive Colab
    New Hive Colab Assessment Highlights Challenges in Uganda’s EdTech Landscape

See Also

  • Cryptocurrency
    Trading Psychology and Emotional Control for Success
    by Staff Writer
    May 4, 2026
  • Why AI-Powered Custom Applications Are Replacing SaaS for Enterprise Workflows
    What Technology Skills Do Young Professionals Need to Succeed?
    by Alex johns
    May 3, 2026
  • Artificial Intelligence
    Tresor Wacht Strengthens Its Position with New Intelligence Capabilities
    by Alex johns
    May 1, 2026
  • Artificial Intelligence
    The True Cost of Slow IT Support
    by Alex johns
    May 1, 2026
  • Artificial Intelligence
    Proactive IT Solutions vs. Traditional IT Help: The True Cost of Waiting for Things to Break
    by Alex johns
    May 1, 2026
  • The next era of crypto wallets isn't simply a continuation of present answers but a soar forward in innovation and user empowerment. PHOTO: Forbes
    Cryptocurrency
    Beyond the Private Key: Selecting the Top Crypto Wallet Development Company in 2026
    by PC Tech
    April 30, 2026
  • Dr. James Onyoin (left), Board Chairperson and founding member of Vision Africa AI and Carols Parker (right), Head of AI Programs at Arxia, shake hands after signing an MoU. PHOTO: PC Tech Magazine
    Artificial Intelligence
    AI Can be a Game-changer For Institutions, but Only if it’s Adopted Intentionally
    by Nathan Ernest Olupot
    April 30, 2026
  • Why AI-Powered Custom Applications Are Replacing SaaS for Enterprise Workflows
    Artificial Intelligence
    What AI Already Knows About You (And What You Can Do About It in 2026)
    by Alex johns
    April 28, 2026
  • COURTESY PHOTO
    Cryptocurrency
    Cash vs. digital payments: How cryptocurrency purchases work
    by PC Tech Staff
    April 24, 2026
  • Artificial Intelligence
    8 Advantages of Generative AI Consulting Services for Modern Business
    by Alex johns
    April 22, 2026
PC Tech Magazine PC Tech Magazine
© 2025 PC Tech Magazine. All Rights Reserved.
  • About Us
  • Contact Us
  • Advertise
  • Write a Review
Facebook X Instagram Youtube