Home / Cybersecurity / Cybersecurity


The Imports Of Covid-19 To Nigeria’s Digital Economy: The Increase In The Use Of Technology & The Need For Efficient Digital Policing And Awareness On Cybersecurity & Cybercrimes

Submitted by admin on Wed, 05/20/2020 - 09:24

With the huge amount of data and transactions carried out on the internet, there is therefore an urgent need to need carryout extensive awareness campaigns across the country to enlighten the citizens on safety measures to be implemented.

What is Malware?

Submitted by admin on Mon, 01/13/2020 - 14:53

Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyberattackers/cyber criminals, designed to cause extensive damage to data and systems or to gain unauthorized access to a network

What is Ransomware?

Submitted by admin on Mon, 01/13/2020 - 14:40

Ransomware is malicious software with one aim in mind: to extort money from its victims. It's one of the most prolific criminal business models in existence today, mostly thanks to the multimillion-dollar ransoms criminals demand from individuals and corporations. These demands are very simple: pay the ransom, or have your operations severely compromised or shut down completely.

What is spoofing?

Submitted by admin on Mon, 01/13/2020 - 13:51

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

What is phishing?

Submitted by admin on Mon, 01/13/2020 - 13:07

Phishing is the fraudulent use of electronic communications e.g email, sms , phone call etc. to deceive and take advantage of users. Both individuals and organizations are at risk; almost any kind of personal or organizational data can be valuable, whether it be to commit fraud or access an organization’s network. 

Subscribe to RSS - Cybersecurity