Injection attack in short, is trying to add (inject) a query (a test, a letter, a code, or anything imaginable) at the front end of a web application, hoping the…
Category: Articles
ArticlesManage Your Privacy, Safeguard Your Personal Data
By Richard Kafui0The concept of privacy varies widely among countries, cultures and jurisdictions. It is shaped by public expectations and legal interpretations; as such, a concise definition is elusive if not impossible.…
ArticlesDeveloping Web Applications for Everyone
By Richard Kafui0Understanding the standards and guidelines elicited by W3C documentations is the first step for knowing and understanding how to write codes and develop web applications for everyone that leverages on…
ArticlesStay “Cyber Safe” As You Explore 2020!
By Richard Kafui0Cyber-criminals can also create enticing offers on their Facebook walls asking users to “like” and “share”. In an attempt to do so, you will be asked for personal details which…
ArticlesChristmas Is Here Again! - Stay “Cyber Safe” As You Enjoy
By Richard Kafui0Cyber-criminal can also use the WhatsApp platform to carry out their operations. WhatsApp users will be receiving messages offering “surprised” gift cards that appear to be sent from your phone…
ArticlesLaying the Foundation for the Digital Future; a Digital Perspective
By Richard Kafui0In identifying and developing the right use cases, analytics or the ‘right’ analytics plays a crucial role in giving insights that decision makers will need to embark on a digital…
ArticlesDigital Gender Inequality: Challenges and Proposed Actions (Part 3)
By Richard Kafui0Internet companies must assist women to use the internet safely by providing training that helps in identifying online threats and providing tools for controlling privacy and security settings. Additionally, applications…

