Blog Posts

Africa’s First Supercomputer in Numbers

The African continent is popular for it’s diverse wildlife – after all who doesn’t fancy a Safari holiday? Africans love and revere their animals too, with most national sport teams bear names honoring the continent’s wildlife heritage. For instance, the Nigerian Super Eagles or the Indomitable Lions of Cameroon. In recent decades, it hasn’t been the wildlife catching the eye of the world, but the rapid growth in tech know-how and entrepreneurship, as well as the expanding economy in many

Continue Reading

Hacking and Snooping with Open Source Intelligence Gathering

It could be the NSA, it or that geeky dude next door, or it could even be your IT guy… Hacking always commences with reconnaissance, searching and sorting through any available information on the target. In the web 2.0 age of the internet, a lot of that information is freely accessible. Unsurprisingly, such information isn’t just useful for hacking in the conventional sense, but is also valued for national intelligence agencies. In fact, the OSINT (Open Source Intelligence) term was coined

Continue Reading

Securing IoT Apps and The OWASP IoT Project

Everything comes alive. It’s the long heralded tech future and the future is now. Many things around us – from bulbs to thermostats and sprinklers – are getting smarter, which simply means that they’re getting easier to administer or personalize. That feat is achieved by designing previously mechanical devices to be  digital, enabling them to run complex software that process digital input commands, and even hooking them up to the internet in many cases. Et Voilà! The Internet of things (IoT)

Continue Reading

Building an Information Security Community in the Heart of Nigeria’s Tech Hub

[tribulant_slideshow gallery_id=”3″] I still remember the most productive cup of coffee I had last winter. It was a cappuccino served by an outlet called Dukes, at the City Gate business centre in Cork, Ireland. Darren Fitzpatrick and I were catching up after weeks of ‘maybe next week?’. It’s not the cuppa’s taste I remember, although I guess it must have been alright given that Darren loves Dukes and he know’s more about the caffeine monkey than I ever will. But in the time it took

Continue Reading

Comparing Single Sign-on Protocols: OAuth vs OpenID vs SAML vs WS-Federation

From Single-Sign-On for consumers to the integration of partners into corporate systems and applications, in a super connected world, simplifying authentication for your users and your partners is more than a good-to-have. Near-seamless authentication allows you to provide the security for user resources that you must, while keeping your customers happy. How can we achieve this?

Continue Reading

A Day in The Life of a Software Security Architect a.k.a Another Computer Nerd

It had been a super long night. The kind of blurry night that involves going to bed way past midnight and waking up well before dawn, after slipping in about 3+ hours of shut eye. The previous day had brought me the gift of a fascinating issue involving ‘device drivers’, my first foray into that area. I had spent all of the previous evening and most of the night reading up on how device drivers work on the Windows operating

Continue Reading

Infosec Podcasts: Stay informed about Information Security… On The Go

Things happen fast in Cybersecurity. Information technology has always been a rapidly evolving discipline, but in cybersecurity I get the feeling this seem to change even faster. This probably has a lot to do with the nature of ‘immediate urgency’ in this field. Cyber criminals rush to detect and exploit security holes while defenders watch in paranoia lest they get pwned! As such, we experience almost weekly releases of technical discoveries, vulnerabilities,  tools, and new (often controversial) laws.

Continue Reading

Learning to Analyze Malware

Cybercriminals churn out thousands of Malware variants each day, using automated means to modify sections of code to evade Antivirus detection. White Hat malware researchers analyse malicious software by dissecting its different components and studying its behavior on the host computer’s operating system. It’s a pretty interesting and intricate field. What skills are required, though?

Continue Reading