Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 17. To view previous posts, click here. There are many free online services available on the Internet. From storing of documents or media in the cloud to.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 17. To view previous posts, click here. There are many free online services available on the Internet. From storing of documents or media in the cloud to.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 13. To view previous posts, click here. Malicious programs or malware often infect a mobile device when you download applications from an untrusted source. This is one.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 121. To view previous posts, click here. Keeping your operating system and software up to date is as critical as changing your car oil. Every now and.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 10. To view previous posts, click here. Our electronic devices or media devices all store information we may not want anyone else to access. This is why.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 9. To view previous posts, click here. Hotspots can be hotbeds for stealing personal and sensitive data. How? Hackers have been found to create free hotspots as.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 8. To view previous posts, click here. Anytime your computer is logged in, it is vulnerable to physical intrusion. Anybody can get onto your computer and review.. Read more
by Blossom Egbude Over the past week, a picture originating from a Twitter user circulated social media. This picture shows former Mo’Hits Records stars and Nigerian celebrities, Don Jazzy, Dr Sid, D’Prince, Wande Coal, and D’Banj tagged as cultists by.. Read more
Welcome to Cybersecurity in 31 Days. I’m Malan Faya, your host. Today is Day 7. To view previous posts, click here. In electronic communication, wireless technology has spread widely. Whether at home, work, or school or in hotels, libraries, or shared.. Read more