PC Tech Magazine PC Tech Magazine
  • News
    • Artificial Intelligence
    • Banking
    • Entrepreneurs
    • Innovation
    • Partnerships
    • Technology
    • Telecoms
    • Startups
    • Social Media
  • Interviews
  • OP-ED
  • Editorial
  • National
  • Reviews
  • Pictorial
Facebook X Instagram Youtube
PC Tech Magazine PC Tech Magazine
PC Tech Magazine PC Tech Magazine
  • News
    • Artificial Intelligence
    • Banking
    • Entrepreneurs
    • Innovation
    • Partnerships
    • Technology
    • Telecoms
    • Startups
    • Social Media
  • Interviews
  • OP-ED
  • Editorial
  • National
  • Reviews
  • Pictorial
Follow Us
Follow Us
Facebook X Instagram Youtube
PC Tech Magazine PC Tech Magazine
Facebook X Instagram Youtube
  • Africa Tech Summit London 2026
  • Web Summit Africa 2026

Hackers

228

65 posts
  • East Africa
  • News
  • News Archive

Report: 80 per cent of Kenyan websites vulnerable to cyber attacks

byPC Tech
July 25, 2012
spy spy
  • East Africa
  • Features
  • News

Kenya: Hackers Steal ICC Witness Emails

byPC Tech
September 12, 2011
  • Africa
  • News

AfricaHackTrip announces schedule

byJeddy Genrwot
August 26, 2013
The mindboggling volume of data that Microsoft stores for individuals and organizations holds immense appeal to hackers with a wide range of motivations. PHOTO: Matthew Manuel / Unsplash The mindboggling volume of data that Microsoft stores for individuals and organizations holds immense appeal to hackers with a wide range of motivations. PHOTO: Matthew Manuel / Unsplash
  • Editor's Pick
  • Internet
  • OP-ED
  • Security
  • Technology

Why Microsoft is a Hackers Dream Target

byFawad Mohsin
April 2, 2024
  • News Archive
  • Security
  • Social Media

How to Avoid Twitter Hacks

byEphraim Batambuze III
May 8, 2013
Image Credit: ABC News Image Credit: ABC News
  • Internet
  • News
  • Social Media

More Than 32 Million Twitter Passwords May Have Been Hacked And Leaked On The Dark Web

byNathan Ernest Olupot
June 9, 2016
sony1 sony1
  • Gaming

Sony Changes The Subject With Launch Of Playstation Vita

byPC Tech
June 7, 2011
netsecurity netsecurity
  • How - To
  • Internet
  • News Archive
  • Security

Is your website Hacker proof?

byEphraim Batambuze III
May 3, 2013
  • Features
  • Internet
  • News Archive
  • Special Coverage

A Look at The World of Cybercriminals and Their Threat to Business

byEphraim Batambuze III
July 12, 2013
Artificial Intelligence involves using computers to perform tasks normally requiring human intelligence, such as taking decisions or recognizing text, speech or visual images.(Image Credit: Future of Life Institute) Artificial Intelligence involves using computers to perform tasks normally requiring human intelligence, such as taking decisions or recognizing text, speech or visual images.(Image Credit: Future of Life Institute)
  • Artificial Intelligence
  • Research
  • Technology

Artificial Intelligence Poses Risks of Misuse by Hackers

byStaff Writer
February 21, 2018

Top News

  • A gamer pictured playing a shoot out/action video game on his custom built gaming pc. PHOTO: DCStudio / Freepik
    Are Cash Prize Tournaments in Gaming Safe?
  • Seedance vs Traditional Video Production: Key Differences Explained
  • Data security is an ongoing effort that requires vigilance and a commitment to best practices. COURTESY IMAGE
    How Remote Security Maintains a Safe and Secure Environment
  • Africa Tech Summit London returns to the London Stock Exchange on May 29th. COURTESY PHOTO
    Africa Tech Summit London’s 10th Edition Set for May 29
  • AFC Debuts Innovative Dual-Currency Green Bond to Fund Côte d’Ivoire’s Largest Solar Project
  • Pearl Bank, Luwero Branch. COURESTY PHOTO
    Pearl Bank Uganda Records UGX47.3 billion Profit After Tax in 2025 Financials
  • Discover the Features of Vidmud’s AI Photo Editing Platform
  • The Staff Augmentation Market in Southeast Asia: What Singapore Businesses Need to Know
  • Switching to the latest smart home technologies, with an innovative smart lock, you can open your door using your smartphone. (PHOTO: Sebastian Scholz/Unsplash)
    Low-Energy Automatic Door Requirements Explained Clearly
  • Cybersecurity breaches can lead to devastating consequences, and damage to a company's reputation. IMAGE: Freepix
    Cybersecurity Services for Small Businesses: What’s Essential?

See Also

  • Pearl Bank, Luwero Branch. COURESTY PHOTO
    Banking
    Pearl Bank Uganda Records UGX47.3 billion Profit After Tax in 2025 Financials
    by PC Tech
    April 14, 2026
  • Apps & Software
    Discover the Features of Vidmud’s AI Photo Editing Platform
    by PC Tech
    April 14, 2026
  • Cryptocurrency
    Understanding BTC Price: A Complete Informational Guide for Beginners and Investors
    by Staff Writer
    April 14, 2026
  • COURTESY PHOTO
    Artificial Intelligence
    Candy AI Clone: Why Choose Fanso.io for Building an AI Companion Platform?
    by Staff Writer
    April 13, 2026
  • Artificial Intelligence
    Best 5 AI Video Generator for TikTok and Instagram
    by Staff Writer
    April 13, 2026
  • A Los Angeles personal injury lawyer can do an extensive case review on your behalf. (PHOTO: Claim Accident Services/Pixabay )
    Artificial Intelligence
    How AI Agents Are Changing the Way Legal Teams Work — And What Infrastructure They Need to Run Reliably
    by Staff Writer
    April 10, 2026
  • COURTESY PHOTO: Fintech Feature
    Banking
    Flutterwave’s $40 Billion Pivot: From Payment Gateway to Banking Powerhouse
    by PC Tech
    April 9, 2026
  • Banking
    Equity Bank Uganda Launches “Equity Online for Business” to Empower Local Enterprises
    by PC Tech
    April 8, 2026
  • Apps & Software
    Hair Color Changer with AI Photo Editing in 2026
    by Staff Writer
    April 8, 2026
  • Apps & Software
    Will Freelance Website Designers Survive the Rise of No-Code and AI Platforms?
    by Staff Writer
    April 7, 2026
PC Tech Magazine PC Tech Magazine
© 2025 PC Tech Magazine. All Rights Reserved.
  • About Us
  • Contact Us
  • Advertise
  • Write a Review
Facebook X Instagram Youtube