It is needless to say that smartphones have become an essential part of our lives. From communication to entertainment to shopping, we need our smartphones for every little thing we do.
We also use our smartphones to store sensitive and private data like card details, passwords, etc. This makes smartphones the prime targets of hackers.
A hacker can use different ways to get to your phone. One of the ways is by sending a link. If you are an Android user, you should be careful of what links you receive on your phone. That’s because this method is more commonly used...
Calls to your mobile number at times when you are least expecting them are annoying. What if such calls come from unidentified or unknown numbers? What if those calls are from someone harassing you? What if, those are annoying marketing calls? Will you pick up and answer every single call? That makes no sense.
The best solution that you can apply to this nuisance is to block them completely. Yes, it is possible to block unwanted calls from your Android device.
Today, most of the Android phones come preloaded with a system feature of blocking calls. Unfortunately, the feature is hidden...
Losing a smartphone either to theft, mishandling, or any other mishap can be a really horrible experience. Normally, the next step to take after the occurrence of a smartphone loss is to try to recover the device, before replacement comes to mind — i.e when recovery fails.
The actions below are some of the best things we think you should do swiftly as soon as you discover your device has gone missing.
1. Track or Locate the Device
The first advised step is to determine where you device is. This will help tell if your phone was stolen or mislaid, or you...
Smartphone theft is one event every smartphone user may have experienced one time or another. I personally have had my smartphone stolen once and forgot another in a bus I hailed... and it remains an unforgettable experience.
Aside from losing the monetary investment made on the smartphone, invaluable (and irreplaceable) documents, contacts, message history, memories captured in photos, videos, and another multimedia formats will also be lost.
Installing some tracking and monitoring applications beforehand on either your Android or iOS smartphone is an effective way to easily recover your device in the case of theft or mislaid. However, what if you...
Internet of Things or IoT, as it is commonly referred to, is the most advanced form of internet connectivity. IoT allows smart devices to connect to the internet and enables them to act independently and exchange data with each other.
As technology is becoming more and more advanced, IoT has made it possible for cars to drive themselves, devices to broadcast any type of information, and devices that are connected to the internet like smart TVs and smartphones can connect to one another and share files like music and videos.
By the year 2020, there will be around 26 billion devices...
When it comes to phones the first thing we look for is security. Security is the first concern people have and everyone wants to keep their data and information protected.
Apple has ensured to keep security in mind before designing any software update. Apple looks into this matter deeply especially providing physical security.
Since Apple iPhones are pretty expensive and have a higher chance of getting stolen. In this regard, iPhone users need to be careful when saving their information. There are certain measures that should be taken by the iPhone users:
Set a Password
The first step to secure your phone is...
Most small business owners are under the mistaken impression that data breaches and cyber attacks are directed only at large corporate giants such as Google, Target, Citibank, and Anthem to name a few.
However, Small Business Trendz reports that 43% of cybercrime targets small businesses. Further, 60% of businesses are likely to close down within 6 months of becoming victims of hacking incidents.
Given these statistics, a wise option is to take all the necessary steps to protect your company from the possibility of such information leaks. If, despite your best efforts, you find that a data breach has occurred, you...
The WannaCry cyber attack that targeted Microsoft Windows operating system in 2017 infecting over 200,000 computers in over 150 countries, drew greater attention to ransomware and software security in general. So what is ransomware and what should you know about it? Read on!
About Ransomware
Ransomware is a type of malware that denies a victim access to data on their device until a ransom is paid. This malicious software could also issue a threat, such as to delete or destroy the data, in the event of the victim failing to make necessary payment.
You could simply think of a ransomware attack as...
Every 5 seconds there is a case of cyber crime, and this poses a threat to individuals and most especially organizations. Let’s build immunity, join the biggest holistic cyber security event in West Africa.
The CyberXchange Conference 2016 which will hold at the Landmark Event Centre, Lekki Peninsula, Lagos on the 2nd and 3rd November seeks to identify the key trends and technologies in Cyber Security; emerging from diverse industries such as Finance, Payments, ecommerce, Banking, Telecommunications, Law enforcements, Oil and Gas, Insurance, Digital Media, Energy, and emerging start-up companies.
So, are you an Academia, Professional, Researcher, IT guru, Developers of...
The number one topic for CEOs this year is cyber security as well as keeping company and client ecosystems safe. Security issues are even more pronounced with the slump in oil prices causing economic downturns in resource rich countries and in turn spurring an accelerated uptick in cyber criminal activity and corporate espionage.
CyberXchange Conference 2016 is a direct response to this clear and present challenge in West Africa;a global convergence of Information Security professionals which is set to hold on 2nd and 3rd of November at the Landmark Event Centre, Lekki Peninsula, Lagos Nigeria.
During the two-dayconference, carefully selected topics...
Hey guys, do you know that registration for the largest CyberXchange Hackathon in Africa ends in three days?
The pre-qualifier registration for the hackathon closes August 30, 2016, which is just 3 days away.
The competition which is sponsored by Facebook, will bring undergraduates and early IT professionals together for a session of hacking, learning and fun! The hackathon is aimed at developing the capacity of budding information security professionals.
So, if you are a whiz in software and information technology, this CyberXchange Hackathon will give you an opportunity to battle with the best in the field and engage in interactive learning...
Clear your calendar - It's going down! First ever CyberXchange Hackathon sponsored by Facebook to touch Nigerian soil. Come not just by yourself but with your team to compete against other university and young professionals with less than 2 years experience throughout Nigeria. The pre-qualifier registration closes August 30, 2016.
You will have the opportunity to build a hack against a cyber security issue. So what’s in it for you besides being part of the CyberXchange 2016, the largest cyber security conference to set foot in Nigeria? prizes, worldwide exposure of your company and university team, and so much more.
How...
AVG Technologies has launched the 2014 edition of its award winning Antivirus software. AVG Antivirus 2014 comes with a feature that enables you delete files completely without leaving traces on your hard drive. The new AVG antivirus has also added a feature for encrypting your files, keeping it secure from prying eyes.
Download AVG AntiVirus 2014
AVG Antivirus 2014 still comes with superior virus detection and removal capability. It detects, blocks and removes viruses, spyware, malware, and rootkits. The antivirus scans links before you click them keeping you safe online. Even links on Facebook and emails as well as incoming downloads...
Last week, Bluebox Security, a security firm, uncovered a 4 year old vulnerability in Android's security system. According to Bluebox, the vulnerability allows a hacker to modify the APK code of an Android application without breaking its cryptographic signature, making its potential harm undetectable by the Android security and authentication system.
Where to Buy Smartphones
Jumia.com.ng from ₦27,999.00 Buy Now
According to Bluebox this vulnerability has been around for at least since Android 1.6 and could affect any Android device released in the last four years or potentially over 900 million Android devices.
Cryptographic signature enables Android to verify whether an app is...
AVG Technologies has launched the 2014 edition of its award winning Antivirus software. AVG Antivirus 2014 comes with a feature that enables you delete...
Last week, Bluebox Security, a security firm, uncovered a 4 year old vulnerability in Android's security system. According to Bluebox, the vulnerability allows a...
Clear your calendar - It's going down! First ever CyberXchange Hackathon sponsored by Facebook to touch Nigerian soil. Come not just by yourself but...