Of recent, the Federal Government of the Federal Republic of Nigeria passed the Nigeria Cyber Security Law 2025 Act. Here are some of the fact that you need to know about this new law in force in Nigeria. Know the law, don’t do nonsense and be claiming it’s for content creation LEGAL NOTICE…
COMPUTER SECURITY
13 Ways To Avoid Cyber Security Threats
In my previous article, I discussed some of the facts that you need to know about phishing and Business Email Compromise generally. In this article, I want to look at some of the facts that you need to put into consideration to avoid cyber security threats. Follow me as we will look at…
Facts About Business Email Compromise Attack
In my previous article, I talked about some of the facts that you need to know about phishing activities in a network security environment. In this article, I will be looking at all that you need to know about Business Email Compromise attack. Follow me as we will look at that together in this…
Role Of Hacktivists In Network Security Threats
People are always at risk of consequence from cyber threats. Some bad actors make use of phishing where people are tricked to enter their details while they think they are on the right website. Some of these are sent through email that looks like original emails. Hacktivists Hacktivists are groups of criminals who unite to carry…
Roles Of Cyber Criminals In Security Threats
A Cyber Criminal belongs to an organized group. They plan to attack devices and steal data. They always threaten to corrupt data so as to throw the entire organization into disarray. In this article, I want to talk about the roles of Cyber Criminals in Security threats. Follow me as we look at it together…
Roles Of Cyber Warrior In Network Security Threats
A cyber-warrior is a person who engages in cyberwarfare, whether for personal reasons or out of patriotic or religious belief. Cyberwarfare may be pursued either to defend computer and information systems or to attack them. Cyber-warriors come in different forms, depending on their roles, but all deal with information security in one form or…
Social Engineering Attacks In Network Security
Social engineering attacks is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.Social engineering attacks happen in one or more steps. A perpetrator first investigates the intended victim to gather necessary background…
Understanding Mobile Security In Network Security
Most of us keep our mobile devices with us throughout the day. We check them frequently. We even keep them at very close range while we sleep because these devices enable access to information anytime and anywhere. Today, they conduct more than half of all internet traffic, and the distinction between a mobile device…
How To Handle Cyber Prostitution And Others
First and foremost, there are many unlawful activities that happen online that can compromise the security of your devices. One of such is cyber prostitution and virtual mugging among others. In this article, I want to talk more about how to handle cyber prostitution and secure your network environment. Follow me as we are going…
6 Negative Impacts Of The Internet On Child Pornography
In my previous article, I talked about some of the risks that are associated with surfing the web. In this article, I want to talk about some of the negative impacts of the internet on child pornography. Follow me as we are going to look at that together in this article. #1 Easy access…
JBL Flip 5 Waterproof Bluetooth Speaker: A Comprehensive Review
One thing that has become part of our life is Music. Julius Caesar of Blessed memory said if Music is the food of life, let’s play on. If you come from my own kind of environment where people love to keep themselves busy with good music coming from a good sound system, then you…
Computer Security Checklists : Here Are The Checklists For Device Safety
In my previous articles, I have talked about some of the facts that you need to know about computer security generally. In this article, I want to look at some of the computer security checklists that you need to follow you need to confirm whether your devices or network infrastructure are secured or not. Follow me…
Recovering Unknown Password: How To Do It With Examples
Passwords are one of the ways that you can use to secure your devices from unauthorised access. When you have a strong password, you will be able making it difficult from hackers and other unauthorised users from having access to your device. In this article, I want to look at means of recovering unknown…
Windows Operating System Security: How To Protect Windows OS From Hackers
Do you remember that look on your face when your last Operating System gets corrupted? It was not funny at all. I am here today to assist you to avoid that kind of scenario again. I want to talk about guidelines for Windows Operating System Security. Follow me as we are going to look…
Data Packets In Network Security: Understanding The Nitty Gritty Of How It Works
In my previous article, I have looked at all that you need to know about networking basics. In this article, I want to look at all that you need to know about data Packets in network security. Data Packets In Network Security After you might have established a connection with the network through cables…
IP Addresses: What Your Network Administrator Never Told You
In my previous article, I have thrown more light on some of the facts that you need to know about networks generally. In this article, I will be looking at some of the facts that you should know about Uniform Resource Location also known as URL or web addresses. The first major issue is…
IP Subnetting: Revealing The Secret Behind The Numbers
In my previous article, I have talked about all that you need to know about IP addresses in network security. In this article, I want to talk about all that you need to know about IP subnetting. Follow me as we are going to look at this together in this article. …
6 Common Terminologies In Computer Security
6 Common Terminologies In Computer Security When it comes to the issue of security of our properties or our devices, it seems to be an issue that concerns all of us. In this article, I want to talk about six common Terminologies in computer Security. Follow me as we will familiarize ourselves with these…
4 Reasons Why You Need Computer Security
First and foremost, there are many of us that are so careless about our devices. How many of us password our system or devices. Some do not even believe that it is necessary to add strong passwords to their devices. This makes it very easy for intruders to have access to your devices. In this…
6 Potential Losses Due To Security Attacks
There are many things that can happen when it comes to computer security. So many things can go wrong. If you are not security conscious and take the security of your devices serious, it can open you up to many forms of attacks. Potential losses due to Security Attacks In this article, I…