Cybersecurity has become everyone’s business as is evident in the popularity of critically acclaimed TV Show, Mr. Robot. Yesterday, I mentioned Mr. Robot to one of the few colleagues of mine who hasn’t seen it and he asked: “You mean there is a TV series about Cybersecurity and the main character is a hacker?”…. You better believe it:) …
Category: Tech
In an earlier post, I described 5 rules software users can follow to select secure passwords. Trust is a two way street. Software developers expect users to select strong passwords and likewise, software users expect their data (including passwords) to be stored securely by software vendors. There never seems to be a wrong time to talk about this considering the almost constant trend of data breaches. One of the latest of those occurred at Uk Broadband and Telecom provider Talk Talk earlier …
The internet has become a pseudo focal point of human existence. The interconnectedness of the web and the services it offers presents us with something akin to a double-edged sword. On one hand, we enjoy the ease of interacting or transacting from anywhere in real time. On the other hand, we are exposed to a loss of privacy as web service providers and governments access information that we provide knowingly or otherwise. We are also exposed to security risks from …
In Cork and in all of Ireland, the IT revolution keeps gathering steam and shows no signs of slowing down. Ireland’s corporate tax most likely played a part in incentivising tech power houses to set up shop and the governments’ support for small businesses through agencies like Enterprise Ireland has been great for startups nationwide. I’m also willing to bet that a lot of the startup energy rocking the nation is down to local talent, some of whom are skilled …
Hardly a week goes by without news of a major hack or data breach. Security professionals and penetration testers must keep abreast of multiple security threats and tools for different platforms and environments. That task is made easier through the use of security assessment toolkits that combine several security assessment tools, usually onto a linux distro or live CD. However, there are so many of such toolkits that finding the right one(s) takes some searching. After much googling myself, I decided to …
[tribulant_slideshow gallery_id=”2″] …
Like many countries across the world, Nigeria is experiencing interesting times. News media is agog with tales of different sorts, from a promising transition of democratic power which happens to be filled with hiccups in fuel and power supply to the terror of Islamic militants in the north. The upheavals are set against a backdrop of relentless technological advancement in mobile and web technology with Lagos being something of the Tech Ground Zero. However, like I described in my previous post …
Information security is often described as an arms race. Whitehat vs Blackhat, Pentesters vs Hackers, Good vs Evil. This post zeroes in on a tiny bit of that never-ending duel. HTML5 & JS apps are awash with input validation/ injection issues that developers need to be mindful of. There is also the issue of the ease of access to proprietary code in the app (something on mobile app security issues stats?). To protect against piracy or at least make it …
Africa is touted as the next emerging market frontier and is home to 5 of the worlds fastest growing economies. She has a vibrant digital ecosystem especially in areas such as mobile platforms and social media. However, there is still some way to go in terms of infrastructure. This deficiency affects power, technology, and the broader business sector. I have become increasingly curious about the awareness of information security in Nigeria and Africa. My question, how are African economies securing their …
Who does not enjoy free WiFi, especially when commuting? I know I do. This past weekend, I took a trip from Cork to Dublin and as you’ll expect in most urban environments, I was surrounded by WiFi. On the bus, in the hotel, at the coffee shop and even during lunch at a hip restaurant, free WiFi bid me relax, connect, browse the web. Here are a few tips for using public WiFi securely: 1. Leverage HTTPS (SSL) connections whenever …