Bypassing a Government-imposed internet shutdown Can the Nigerian government shut down the internet? How feasible is it? How do you bypass internet restriction or shut down? Here is all you need to know.
6 ways to protect your devices from stalkers and Spyware Spyware is hard to define because we are yet to agree on what constitutes "consent" and "harm". Regardless, here are 6 ways to guide against Spyware.
Avoid getting hacked 104: A guide to internet anonymity Perfect internet anonymity is technically impossible, except you build everything you use. But here are some tools and steps to help improve your anonymity.
How to enable Google's 'iMessage for Android' on your smartphone Enabling "iMessage for Android" on your device takes less than 5 minutes with these steps.
Avoid getting hacked 103: A guide to secure personal computers Personal computers contain a trove of personal and sensitive information, which make them a valuable target for hackers. Here are 7 steps to improve the security of our personal computers.
Huawei's Harmony OS: A Third Contender or Pure Hype? Huawei's "Plan B" is a true third contender, if they keep their word.
Avoid getting hacked 102: A guide to securing mobile devices Editor's note: This post is a continuation of our series on how to "avoid getting hacked". Read the first part about secure passwords. Smartphones like other computing devices contain a lot of important and sensitive information, this makes them appealing to hackers and criminals. One in every two people reading
Avoid getting hacked 101: A guide to secure passwords To create more secure logins, it's advisable not to use a password that contains publicly available details. Always ensure your passwords contain a random series of text and symbols.
7 ways to protect yourself from ransomware attacks on your Spectranet and Smile mobile hotspots Here is how it applies to you and how you can limit the risk of a future occurrence while protecting your home/ or office mobile hotspots.
Top 5 VPNs to use in 2019 These five carefully-selected Virtual Private Networks (VPN) will not leak your activity data to third-parties because they do not store it.