Skip to content
No results
  • Diy Guides
  • Innovations
  • Connected
  • Security
  • Gaming
  • Science
  • Features
  • Energy
  • Payments
  • Streaming
  • Login
TV · TOS

Technology • Engineering • Computing • History

Login
  • Diy Guides
  • Innovations
  • Connected
  • Security
  • Gaming
  • Science
  • Features
  • Energy
  • Payments
  • Streaming

Technology • Engineering • Computing • History

No results

Data Security

Home Data Security
  • Jun, 2024
  • 2 mins

The Payment Card Industry Data Security Standard and the purpose it serves

payment card industry data security standard
  • Jul, 2023
  • 2 mins

Google Play to step up measures against malware in apps with DUNS number starting 31 August 2023

google play to step up measures against malware in apps with duns number
  • Jun, 2023
  • 2 mins

How To Setup the Kingston IronKey™ Vault Privacy 50 Encrypted USB Flash Drive

how to setup the kingston ironkey vault privacy 50 encrypted usb flash drive
  • Apr, 2023
  • 2 mins

10 easy steps to Recover Data from a Corrupt SD Card

10 easy steps to recover data from a corrupt sd card
  • Nov, 2021
  • 1 mins

Crash course in ethical hacking – 10 Hours

Crash course in ethical hacking - 10 Hours
  • Sep, 2021
  • 0 mins

Samsung Security Tech Forum 2021

Samsung Security Tech Forum 2021
  • Oct, 2019
  • 3 mins

CyberChef Ultimate Toolbox from GCHQ

CyberChef Ultimate Toolbox from GCHQ
  • Aug, 2019
  • 5 mins

Security threatened by Python 2 end of life

Security threatened by Python 2 end of life
  • Aug, 2019
  • 3 mins

Bluetooth encryption broken

Bluetooth encryption broken
  • Jul, 2019
  • 1 mins

Dixons Carphone hacked

Dixons Carphone hacked
  • Apr, 2019
  • 17 mins

EU ethics Guidelines For Trustworthy AI: Chapter 1

EU ethics Guidelines For Trustworthy AI: Chapter 1
  • Mar, 2019
  • 4 mins

Proposed EU Copyright Directive Approved – Without Amendments

Why EU want Article 13 Be Stopped
  • Jan, 2019
  • 2 mins

4 ways hackers can hack you right now

4 ways hackers can hack you right now
  • Jan, 2019
  • 4 mins

Threat Modeling, a beginners guide

Threat Modeling, a beginners guide
  • Jun, 2018
  • 1 mins

How to Keep up with storage capacity with Files Go

Files-Go
  • Apr, 2018
  • 1 mins

Know this: Don't Brick your Smartphone

Know this, don't brick your smartphone
  • Oct, 2017
  • 1 mins

Ghana begins National Cyber Security week

Ghana National Cyber Security Week
  • Jun, 2017
  • 4 mins

Ghana: Cyber-Security Policy

Ghanam-Cyber-Security-Policy
  • Jun, 2017
  • 3 mins

Microsoft acquires Israeli security firm Hexadite

Microsoft acquires Israeli security firm Hexadite
  • Apr, 2017
  • 10 mins

Data Protection Acts I

Data-Protection-Acts
  • ToS
GTech Booster

© 2025.

Hi
Use Email Address
Manage Consent

To provide the best experiences, we use technologies like cookies to store and/or access device information. By using our Services, you acknowledge that you have read, understood, and agreed to our Terms of Service.

Functional Always active
This is required for the basic use of our services
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Opt-in if you prefer to receive marketing and promotional communications.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}