“With these tools [hacking tools] in your hand, you guys are powered to do anything but remember, with a gun in your hand, you can be security man, you can…
Tag: articles
ArticlesLatest WebApp Security Threats Part 1: How to Perform Injection Attack
By Richard Kafui0Injection attack in short, is trying to add (inject) a query (a test, a letter, a code, or anything imaginable) at the front end of a web application, hoping the…
ArticlesManage Your Privacy, Safeguard Your Personal Data
By Richard Kafui0The concept of privacy varies widely among countries, cultures and jurisdictions. It is shaped by public expectations and legal interpretations; as such, a concise definition is elusive if not impossible.…
ArticlesStay “Cyber Safe” As You Explore 2020!
By Richard Kafui0Cyber-criminals can also create enticing offers on their Facebook walls asking users to “like” and “share”. In an attempt to do so, you will be asked for personal details which…
ArticlesChristmas Is Here Again! - Stay “Cyber Safe” As You Enjoy
By Richard Kafui0Cyber-criminal can also use the WhatsApp platform to carry out their operations. WhatsApp users will be receiving messages offering “surprised” gift cards that appear to be sent from your phone…
ArticlesLaying the Foundation for the Digital Future; a Digital Perspective
By Richard Kafui0In identifying and developing the right use cases, analytics or the ‘right’ analytics plays a crucial role in giving insights that decision makers will need to embark on a digital…
ArticlesDigital Gender Inequality: Challenges and Proposed Actions (Part 3)
By Richard Kafui0Internet companies must assist women to use the internet safely by providing training that helps in identifying online threats and providing tools for controlling privacy and security settings. Additionally, applications…

