Tech Trends

Securing All Your Social Media Accounts

Social media: growth is vast, and its power is unstoppable for the time being. For most people, social media has become a part of their daily life and a place where they can boost their confidence or gain new friends by sharing their accomplishments, adventures, experiences or just any of their unforgettable moments. Almost all today has their own social media account, from Facebook, Twitter, Instagram, Gmail and such, we

Nigerian Police Fight Cybercrime With International Co-operations

In our fast paced world of social media and increased connectivity, the necessity for cyber security cannot be overemphasized. Speaking at the Interpol Cybercrime Training for Practitioner Investigators from African Countries held in Abuja, Hyacinth Dagala, Deputy Inspector General of Police (DIG), dwelt on the need to have investigators equipped with the requisite skills to combat cybercrime. Matching words with action, the police have made notable steps by setting up

Protect Yourself From Social Media Scams

In addition to protecting yourself against hackers, however, you need to guard against scammers who target social media users. Here are eight ways to avoid scams on social media: 1. Watch out for scam giveaways, contests, and surveys. Criminals sometimes offer “free gift cards” or “amazing discount coupons” under the guise of bringing business to a particular venue, or offer some reward in exchange for completing a survey. These are scams

HACKISM: How Attackers Gain Access to WordPress Sites

In today’s post we dive into some very interesting data we gathered a couple of weeks ago in a survey, letting the facts tell us what matters most. The question we asked in the survey was: If you know how your site was compromised please describe how the attackers gained access. The answers were free form text, so we manually categorized the answers. If the respondent expressed any doubt in

Cyber Forensic Investigation: Do It Yourself Here.

A Forensic investigation helps the organisation collecting and analyzing the data as evidence. The data collected by forensic investigation can be used as a proof in a court. Because of this, data must be protected in a safe way and needs to be prevented  from modification. What do you mean by forensic investigation? Forensic investigation means to analyse the data from the computer and collect it as a proof if

HEIST: Private Website Data Security

Two Security researchers Mathy Vanhoef and Tom Van Goethem explained their finding in Black Hat Conference this week. HEIST is defined as (HTTP Encrypted Information can be Stolen Through TCP-Windows) Compression-based attacks such as CRIME and BREACH can now be performed purely in the browser, by any malicious website or script, without requiring network access,” the researchers said in the paper. “If we know that HTTP/2 is used, we can let