Introduction Telecommunication has become a major drive for socio-economic growth, globally. The utilization of the opportunities that come with it has led to the proliferation of telecommunication masts (Masts). Masts…
News
ArticlesCyber Security in Ghana: Talk or Action?
By Richard Kafui0articles, Cyber Security, Ghana, Samuel HaganAccording to the Cybercrime Unit of the Criminal Investigation Department of the Ghana Police Service, Ghana lost over USD 105 million to cybercrime at the end of 2018. These figures…
ArticlesAfrican Continental Free Trade Area (Afcfta) – An Exposition of the Proposed Digital Payment System
By Richard Kafui0African Continental Free Trade Area, articles, Digital Payment System, Samuel HaganAfrica and Ghanaians were thrilled with the news of the operationalization of the African Continental Free Trade Area (AfCFTA) agreement on the 7th of July 2019. AfCFTA as affectionately called,…
ArticlesDigital Skills: An Important Requirement for Employment
By Richard Kafui0articles, David Gowu, Digital Skills, EmploymentThe fourth industrial revolution is here with us and we must all be prepared to embrace it. One of its key requirements is digital skills that opens the door to…
ArticlesSocial Networking, In the Eye of the Hacker, Attacker and the Cyber Criminal (4)
By Richard Kafui0articles, Cybercrime, John Dadzie, Social NetworkingSharing Online Content It is great to share a link to a website and grab your friend’s & contact’s attention. But you never know that hackers are always with bated…
ArticlesSocial Networking, In the Eyes of the Hacker, Attacker and the Cyber Criminal (3)
By Richard Kafui0articles, Cybercrime, John Dadzie, Social NetworkingIn this third part of the series on Social Media security and privacy, I would like to further expose the reader to other unsuspecting pieces of information that attackers earnestly…
ArticlesSocial Networking, In the Eyes of the Hacker, Attacker and the Cyber Criminal – Part 2
By Richard Kafui0articles, John Dadzie, Social Media, Social NetworkingIn the part two of this article, we take a look at the ways in which different types of information provided on social media sites are exploited by attackers. First…

