June 2018

Olusola Fabiyi, Abuja The Special Adviser to the President on Niger Delta and Coordinator of the Presidential Amnesty Programme, Prof. Charles Dokubo, has warned that reliance on computer systems, wireless networks and ubiquitous Internet-enabled smart devices, including smartphones, televisions and various tiny devices, has made Nigeria vulnerable and susceptible to potentially debilitating attacks. According to […]

Tinder, the popular online dating application, says it is taking steps to better secure the privacy of its users by encrypting some of its data. Match Group Inc., the company that operates Tinder, told Sen. Ron WydenRonald (Ron) Lee WydenNSA dumps millions of phone records collected by telecom companies Hillicon Valley: NSA deletes call records | Tinder swipes […]

A $1 million grant will fund a Howard University project on cybersecurity. (Doug Kapustin for The Washington Post) A $1 million grant will fund a research project at Howard University aimed at addressing cybersecurity concerns, the university said this week. There is a national security need for protecting what are known as “cyber-physical systems,” said […]

Olusola Fabiyi, Abuja The Special Adviser to the President on Niger Delta and Coordinator of the Presidential Amnesty Programme, Prof. Charles Dokubo, has warned that reliance on computer systems, wireless networks and ubiquitous Internet-enabled smart devices, including smartphones, televisions and various tiny devices, has made Nigeria vulnerable and susceptible to potentially debilitating attacks. According to […]

LONDON (AFP) –  Visitors to Britain’s revamped Royal Air Force Museum opening on Saturday can fend off cyber attacks, identify airstrike targets and practice landing jets on flight simulators. The north London attraction has been overhauled to mark the RAF’s centenary this year, with celebrations culminating in a spectacular flypast over Buckingham Palace next month. Its […]

Here is the latest article in a new eWEEK feature series called IT Science, in which we look at what actually happens at the intersection of new-gen IT and legacy systems. Unless it’s brand new and right off various assembly lines, servers, storage and networking inside every IT system can be considered “legacy.” This is because […]