by Rita Anwiri Chindah, ACIArb Introduction For most lawyers, going to court to represent clients is a thing of joy. Many legal practitioners believe that if you are not in litigation, you are not in legal practice. Indeed, both oral.. Read more
by Rita Anwiri Chindah, ACIArb Introduction For most lawyers, going to court to represent clients is a thing of joy. Many legal practitioners believe that if you are not in litigation, you are not in legal practice. Indeed, both oral.. Read more
by Tobechukwu Ndunagwu Stan Lee (Stanley Martin Lieber) December 28, 1922–November 12, 2018 (95 years) was an American comic-book writer, editor, producer and publisher. Lee was key to Marvel’s expansion from a small division of a publishing house to a.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 30. To view previous posts, click here. Simple passwords are guessed in minutes by a password-cracker program. Always use complicated passwords. A password-cracker program can be used.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 29. To view previous posts, click here. Kids may be exposed to danger online. Teach (your) kids what they can and can’t share over the Internet. Kids.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 28. To view previous posts, click here. Sensitive hardcopy files, if not properly disposed, can represent a significant security issue. A hardcopy file can be copied without.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 27. To view previous posts, click here. For a safer web browsing experience, look for HTTPS in the web address before submitting sensitive information to a site… Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 26. To view previous posts, click here. Certain types of attachment are more dangerous than others. While viruses and malware can potentially be embedded in most types.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 25. To view previous posts, click here. Social media is now the haunting ground used by scammers in finding their victims. The most common social-media scams reported.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 24. To view previous posts, click here. Cybercriminals use search engine optimization (SEO) to trick you into visiting malware sites. SEO poisoning is an attack method that.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 23. To view previous posts, click here. Rooting is a process that allows a user to have superuser rights. With superuser right, you have privileges to modify.. Read more