How to Protect Digital Privacy and Security During COVID-19 Response
What do cyber-attacks, virtual learning platforms, and the spread of misinformation online have in common?
All have seen substantial spikes over the past four...
Apply Now for $210,000 in ICT4D Grants for Asian Technology Projects
ISIF Asia is a grants and awards program empowering communities in the Asia pacific region to research, design and implement Internet-based solutions for their...
4 Digital Security Principles to Protect Yourself from a Cybersecurity Nightmare
2017 was an exciting and terrifying year in cybersecurity news. The digital world saw an upsurge in headlining ransomware, disclosure of large-scale data leaks...
Apply Now for $155,000 in ISIF Asia Grants and Awards
ISIF Asia is a grants and awards program empowering communities in the Asia pacific region to research, design and implement Internet-based solutions for their...
What’s Your ICT4D Cyber Threat Model?
Threat models can make ICT4D more secure and safe to use. In computer science, “threat modeling” is the approach of playing through attacks and hacks ahead...
The Number 1 Reason Why You Do Not Encrypt Email
Two new Pew Research Center studies are very enlightening around the American public’s perception of privacy, security, and surveillance. While both reports...
10 Signs That Your Computer is Infected with Viruses, Malware, or Trojans
PandaLabs, the anti-malware laboratory of Panda Security, has produced a simple guide to the 10 most common symptoms of infection, to help all users find out if...