Technology

Home Technology

Empowering Women to Become Active in The Tech Industry

Globally, the tech ecosystem has been male dominated; this agrees with researches carried out in some major technology companies. There have been a relatively...
WordPress

What can you do if your WordPress Site is Prone to Attack?

WordPress is blogging software built around an open source script, and there are divergent views concerning the security. Some say the open source script is...

The Modern Day Technology of Convenience

The predominance of technology today is bringing forth convenience, making humans more productive than others who lived decades ago. Some of the gadgets are...

Telecom Operators Must Think Deep to Unlearn Their Thoughts about OTT Services

The dash for OTT services has completely leapfrogged the services provided by telecom companies, and I could vehemently state that the Nigerian telecom industry...

How Churches are Getting Disrupted by Technology

Over the years, technology has been evolving the old fashion way we used to do things, from healthcare and educational system to all facets...

Paying Attention to Details While Installing an Android App

Most people have argued a lot about the security level of the Google Play Store, an application store that records the highest numbers of...

Strengthening The Financial Services Industry With Cognitive Security

Is it possible for any organisation to fight cybercrime without the aid of artificial intelligence or machine learning, especially, for those with complex systems...

Dark Web: Know these Hacks Before you Visit

I have heard a lot about the dark web, and recently, I got curious, dig deep to know what it is. The term dark...

Tecno Takes Manchester City Partnership to New Level with Branded Device

Tecno Mobile, leading mobile phone maker and ‘Official Tablet and Handset Partner of the Manchester City Football Club’, recently announced exclusive sales agreement of...
Dvmap Trojan, Android Malicious App With Code Injection

Dvmap Trojan, Android Malicious App With Code Injection

The security threats of downloading Android application are turning a new leave following the discovery of Dvmap Trojan and users like game lovers must...

Health Remains a Priority, Despite Disagreement Amongst NCC, NSE, Others

In 2012, the House of Representatives passed the second reading of the Telecommunications Electromagnetic Frequency Emission (EMF) Protection Bill sponsored by the House Committee...

Will the Internet Replace College and University?

Globally, there are series of controversies around the future of higher education considering the way the internet has transformed over time. The evolving nature of...

How to Deal with Online Identity Theft.

One of the dangers posed by the internet is online identity theft, which means data privacy could be compromised. Available reports reveal that in 2016...

4 Incredible Functions of your Mobile Phone

Smartphone is one of the greatest innovation ever, there are a few things you could do with it when it matters most. With your smartphone,...
Smart Connected Devices (IoT) are too Weak to Resist Cyber Attack.

Smart Connected Devices (IoT) are too Weak to Resist Cyber Attack.

When you talk about smart connected devices, you talk about the concept of IoT (Internet of Things). Globally, it has become one of the trends...

Experts Views on how to Handle the Surge of Ransomware

Malicious attack called ransomware has been making headlines after cybercriminals launched their attacks on hundreds of thousands of computers worldwide. A lot of cybersecurity...

LG Unveils 70% Energy Saving Dual Inverter Air Conditioner

Global leader in consumer electronics and home appliances, LG, has introduced to the the Nigerian market "All New Gencoool Dual Inverter Airconditioner" which...
malicious Apps

How to Spot and Avoid Downloading Infections App

Sometime, we download malicious applications without knowing. Mobile Apps Store ecosystem such as the Google Play and Apple are not entirely free from malicious...

Are Websites and Smartphones Prone to Cyber Attack?

I would say, there are lots of infections online considering the level of internet penetration and the rate at which cybercriminals operate. From health...

Why Chinese Smartphones will Always Remain Cheaper…

There is usually a wrong perception about the quality of products like shoes, smartphones, bags etc from China. The wrong perception is that China products...