As with any new technology, criminals are always quick to find loopholes to exploit. Since people use QR codes to store information, scammers manipulate them to hide fake websites and malware. This social engineering technique is known as Quishing or QR phishing.
Learn the benefits of cross-border payments and how you can start accepting them.
Learn how you can use cross-border gateways to accept business payments from customers across countries in Africa.
Embedded finance is growing in Africa. Its applications and benefits are numerous. Learn how your business can use the technology.
A post informing the general public about Kora's latest feature. Pay with Bank.
A summary of the KoraHack23 Hackathon sponsored by Kora and Google Developers Group.
Kora partners with Healthracka to provide employees with free cervical cancer test kits.
Kora welcomed the Africa Caucus group from the Harvard Business School to their office in Lagos, Nigeria.
Advice for women in tech from women in tech.
New product to help accelerate Africa’s participation in global trade.
Kora is now an ISO 27001 & ISO 22301-certified organization
We moved our URL address and updated our name. Read this to find out why.
The very first of our new series, Into the Koraverse.
The origin story of Africa's biggest logistics company.
In this month's Merchant Stories entry, the CEO, Ifeoluwa Dare-Johnson, tells us about the company's early days and how she got the idea for the business.
What is now known as MyXalary started as a way to manage employee databases, taxes, and pensions. When that became stable, the cofounders began advancing the software by adding features.
For our International Women’s Month series, #EmbraceEquality, here’s Favour, a member of the People Operations team at Kora.
For our International Women’s Month series, #EmbraceEquality, here’s Promise, a Senior Product Manager at Kora.
For our International Women’s Month series, #EmbraceEquality, here’s Ayobami, a front-end engineer at Kora.
For our International Women's Month series, #EmbraceEquality, here's Ajiri, a Senior Product Designer at Kora.
As with any new technology, criminals are always quick to find loopholes to exploit. Since people use QR codes to store information, scammers manipulate them to hide fake websites and malware. This social engineering technique is known as Quishing or QR phishing.
Your mobile device is an easy target for cybercriminals. Every day, they find new ways to exploit our slightest vulnerabilities. With Artificial Intelligence becoming more ubiquitous, their social engineering techniques have become even more dangerous.
In this post, we’ll share six tips to help you improve your password hygiene and reduce your exposure to cyber risks.
This "voice cloning" technology is sophisticated and gets better every day. You might recall the music track featuring the voices of Drake and The Weeknd that went viral last year. It was impossible to recognise the voices as artificial until the creator disclosed that neither artist was involved in the creation. AI was used to recreate their voices perfectly.