Home » tech news » Page 81

tech news

Who is Buying Crypto in South Africa?

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

What is V-Hub? Vodacom’s New Portal for SMEs

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Nedbank’s Avo App Scores Over 1-Million Users

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Moderna to Build its First African Vaccine Plant in Kenya Worth $500M

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Google Pledges $1-Million to Support Women Entrepreneurs in Africa

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

4 Types of Hackers That You Probably Didn’t Know Existed

Image sourced from Pixabay A security hacker is someone who explores methods for breaching defences and exploiting weaknesses in a computer system or network. To the laymen, hackers are known as the bad guys of the internet, but it is way more than that, and there are many types of hackers that you probably have never heard of before. The most common attacks on the internet include malware, phishing, Man-in-the-Middle (MITM) attacks, Denial-of-Service (DOS) attacks, SQL injections, zero-day exploits, password attacks, and cross-site scripting. And all these types of attacks are the ones that gave hacking sort of a bad name. According to Kaspersky, MIT (Massachusetts Institute of Technology) became one of the first homes of hacking in 1969. They started out by altering software and hardware...

Kenya Power To Start Selling Fixed Internet – What We Know

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Absa Signs 3 New Deals to Support Africa’s Growing Tech Space

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

South Africa’s Datacentrix Wins Big at the HPE Channel Awards 2022

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Why Women Are Underrepresented in Cybersecurity

Sourced from Women in Tech Africa. One of the industries struggling with significant bias and gender stereotypes is cybersecurity. This field plays an increasingly crucial role in our digital world and, as a result, offers many fulfilling career paths and opportunities. However, there are still significant barriers and misperceptions driving the belief that a career in cybersecurity is not for women. While women have been disproportionately impacted by pandemic-driven unemployment (for example, one in four women reported job loss due to a lack of childcare—twice the rate of men), the technology sector was less affected. This was mainly due to their being better prepared to pivot to remote work and flexible work models. As a result, according to a report by Deloitte Global, l...

4 Important Things You Need to Know About ICASA’s Auction Tomorrow

After several years of delays, cancellations, court cases and the setting of further and further deadlines, the Independent Communications Authority of South Africa (ICASA) is finally set to auction access to SA’s much-coveted spectrum for mobile broadband services. Two auctions will be held – one on 8 March and another on 10 March. The second auction is considered the “main” auction. Here are 4 things you need to know about tomorrow’s ICASA auction: The Opt-In Phase Auction The first highly-anticipated auction will be held on Tuesday 8 March with every big name telecom in the country lining up to take a seat at the table. For the last several weeks, ICASA has conducted mock auctions and a bidder seminar to ensure that potential participants are comfortable with the bidding process. Accord...

MTN Uganda Posts Results, Sees Increased Profits

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.