Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 10. To view previous posts, click here. Our electronic devices or media devices all store information we may not want anyone else to access. This is why.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 10. To view previous posts, click here. Our electronic devices or media devices all store information we may not want anyone else to access. This is why.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 9. To view previous posts, click here. Hotspots can be hotbeds for stealing personal and sensitive data. How? Hackers have been found to create free hotspots as.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 8. To view previous posts, click here. Anytime your computer is logged in, it is vulnerable to physical intrusion. Anybody can get onto your computer and review.. Read more
by Blossom Egbude Over the past week, a picture originating from a Twitter user circulated social media. This picture shows former Mo’Hits Records stars and Nigerian celebrities, Don Jazzy, Dr Sid, D’Prince, Wande Coal, and D’Banj tagged as cultists by.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 7. To view previous posts, click here. In electronic communication, wireless technology has spread widely. Whether at home, work, or school or in hotels, libraries, or shared.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 6. To view previous posts, click here. The rate of ATM-card related scams have been high. Very high. With ATM fraudsters everywhere these days, you can’t be.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 5. To view previous posts, click here. I read somewhere that in the good old days, people get mad when you access their diaries without their consent… Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 4. To view previous posts, click here. Remember the days of Infrared? Though old school now, a hacker would at least need to connect with your mobile.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 3. To view previous posts, click here. As life and business become increasingly mobile, mobile-phone communication has become prevalent. Accessing workplace data on a mobile phone benefits.. Read more