Practical Insights on Cybersecurity

What’s Your ICT4D Cyber Threat Model?

What’s Your ICT4D Cyber Threat Model?

Published on: Nov 18 2015 by Guest Writer - 1 Comment
Threat models can make ICT4D more secure and safe to use. In computer science, “threat modeling” is the approach of playing through attacks and hacks ahead...
The Number 1 Reason Why You Do Not Encrypt Email

The Number 1 Reason Why You Do Not Encrypt Email

Published on: May 22 2015 by Wayan Vota - 5 Comments
Two new Pew Research Center studies are very enlightening around the American public’s perception of privacy, security, and surveillance. While both reports...
10 Signs That Your Computer is Infected with Viruses, Malware, or Trojans

10 Signs That Your Computer is Infected with Viruses, Malware, or Trojans

Published on: Oct 11 2010 by Wayan Vota - 2 Comments
PandaLabs, the anti-malware laboratory of Panda Security, has produced a simple guide to the 10 most common symptoms of infection, to help all users find out if...