Verify every information source. There is currently an overload of digitized information on COVID-19 outbreak purporting to be genuine and credible, and so the need to obtain authentic information cannot…
News
ArticlesScam-baiting Case study: The Scammer in the refugee camp (Part 1)
By Richard Kafui0articles, Cyber Fraud, KAUNDA Ibn Ahmed, Scam baitingScam baiting is a form of internet vigilantism, where the vigilante poses as a potential victim to the scammer in order to waste their time and resources, gather information that…
IIPGH NewsInstitute of ICT Professionals Ghana (IIPGH) Organizes Data Science and Cyber Security Workshop
By Richard Kafui0current news, Cyber Security, Data Science, iipgh newsThe workshop had three resource persons, who gave real life scenarios in their various fields of expertise, bringing the narrative to the barest understanding, in order for professionals and students…
ArticlesDigital Literacy: an enabler to the successful implementation of the African Continental Free Trade Agreement (AfCFTA)
By Richard Kafui0AfCFTA, articles, Awura Abena Amponsah, Digital LiteracyWe need to devise means of educating our retailers on enhancing their businesses with technology. For instance, equipping them with web browsing skills, use of search engines, email, text, and…
ArticlesFacebook Will: What Will Happen To My Facebook Account After I Pass Away?
By Richard Kafui0articles, Facebook, KAUNDA Ibn Ahmed, MemorializationThis particular post is about Facebook platform. That feature on Facebook is called “Memorialization“. In short, you are creating a Digital Will for your Facebook account.
ArticlesLatest WebApp Security Threats Part 2: How to Prevent Injection Attack
By Richard Kafui0articles, Injection Attack, KAUNDA Ibn Ahmed, Web Application Security“With these tools [hacking tools] in your hand, you guys are powered to do anything but remember, with a gun in your hand, you can be security man, you can…
ArticlesLatest WebApp Security Threats Part 1: How to Perform Injection Attack
By Richard Kafui0articles, Injection Attack, KAUNDA Ibn Ahmed, Web Application Security, Web ApplicationsInjection attack in short, is trying to add (inject) a query (a test, a letter, a code, or anything imaginable) at the front end of a web application, hoping the…

