As Cyberattacks Increase, Should You Acquire Cybersecurity Stocks?

Cybersecurity has become everyone’s business as is evident in the popularity of critically acclaimed TV Show, Mr. Robot. Yesterday, I mentioned Mr. Robot to one of the few colleagues of mine who hasn’t seen it and he asked: “You mean there is a TV series about Cybersecurity and the main character is a hacker?”…. You better believe it:)

Continue Reading

Passwords 102: 6 Basic Rules for Storing Secrets Securely in Software

In an earlier post, I described 5 rules software users can follow to select secure passwords. Trust is a two way street. Software developers expect users to select strong passwords and likewise, software users expect their data (including passwords) to be stored securely by software vendors. There never seems to be a wrong time to talk about this considering the almost constant trend of data breaches. One of the latest of those occurred at Uk Broadband and Telecom provider Talk Talk earlier

Continue Reading

India-based Startup Develops Home Router Software for Private and Secure Web Surfing

The internet has become a pseudo focal point of human existence. The interconnectedness of the web and the services it offers presents us with something akin to a double-edged sword. On one hand, we enjoy the ease of interacting or transacting from anywhere in real time. On the other hand, we are exposed to a loss of privacy as web service providers and governments access information that we provide knowingly or otherwise. We are also exposed to security risks from

Continue Reading

An Interview with Peter Coppinger (Teamwork) – Cork’s Serial Entrepreneur

In Cork and in all of Ireland, the IT revolution keeps gathering steam and shows no signs of slowing down. Ireland’s corporate tax most likely played a part in incentivising tech power houses to set up shop and the governments’ support for small businesses through agencies like Enterprise Ireland has been great for startups nationwide. I’m also willing to bet that a lot of the startup energy rocking the nation is down to local talent, some of whom are skilled

Continue Reading

A Comparison of the Top Security Assessment & Penetration Testing Toolkits

Hardly a week goes by without news of a major hack or data breach. Security professionals and penetration testers must keep abreast of multiple security threats and tools for different platforms and environments. That task is made easier through the use of security assessment toolkits that combine several security assessment tools, usually onto a linux distro or live CD. However, there are so many of such toolkits that finding the right one(s) takes some searching. After much googling myself, I decided to

Continue Reading

Could it be Goodbye to ‘419’ Phishing Scams as Nigeria Passes Cybercrime Bill?

Like many countries across the world, Nigeria is experiencing interesting times. News media is agog with tales of different sorts, from a promising transition of democratic power which happens to be filled with hiccups in fuel and power supply to the terror of Islamic militants in the north. The upheavals are set against a backdrop of relentless technological advancement in mobile and web technology with Lagos being something of the Tech Ground Zero. However, like I described in my previous post

Continue Reading

Experiments in JS Obfuscation & Deobfuscation for Hacking HTML5 Apps and Malware Analysis

Information security is often described as an arms race. Whitehat vs Blackhat, Pentesters vs Hackers, Good vs Evil. This post zeroes in on a tiny bit of that never-ending duel. HTML5 & JS apps are awash with input validation/ injection issues that developers need to be mindful of.  There is also the issue of the ease of access to proprietary code in the app (something on mobile app security issues stats?). To protect against piracy or at least make it

Continue Reading

On Information Security & Governments in Africa

Africa is touted as the next emerging market frontier and is home to 5 of the worlds fastest growing economies. She has a vibrant digital ecosystem especially in areas such as mobile platforms and social media. However, there is still some way to go in terms of infrastructure. This deficiency affects power, technology, and the broader business sector. I have become increasingly curious about the awareness of information security in Nigeria and Africa. My question, how are African economies securing their

Continue Reading

4 Security Tips for Using Public WiFi

Who does not enjoy free WiFi, especially when commuting? I know I do. This past weekend, I took a trip from Cork to Dublin and as you’ll expect in most urban environments, I was surrounded by WiFi. On the bus, in the hotel, at the coffee shop and even during lunch at a hip restaurant, free WiFi bid me relax, connect, browse the web. Here are a few tips for using public WiFi securely: 1. Leverage HTTPS (SSL) connections whenever

Continue Reading