phone_radiation_effects_cancer_causing_carcinogenic_

How Dangerous is your Mobile Phone Radiation and Can It Really Cause Cancer?

Background Your phone, while powered on is always communicating with the network even when you are not active on it, hence a continuous emission of radiation. This is how your phone detects when you have an incoming call or message. Some sources like Berkeley News (2021) and The Guardian (2018) believe that the truth about […]

How Dangerous is your Mobile Phone Radiation and Can It Really Cause Cancer? Read More »

7-simple-errors-users-make-that-can-make-hacking-easier

These Simple Errors Make it Easier to Hack You!

Here are 7 common mistakes that make it easier to hack your system, network or online account. Installing pirated software: Looking for a pirated version of a software could lead you to visit malicious websites containing scripts or malware that might automatically infect your PC once you visit them. Moreover, you might end up downloading

These Simple Errors Make it Easier to Hack You! Read More »

how-to-protect-against-denial-of-service-security-threats-2021

DoS attack (Part 2) – How to protect your systems/Infrastructure against DoS and DDoS

Denial of Service (DoS) attacks are destructive and no one wants to make a loss because their server was down and could not make sales. No one wants to lose customers because their streaming server is not always reachable when customers need it and so on. The point is Denial of service comes in different

DoS attack (Part 2) – How to protect your systems/Infrastructure against DoS and DDoS Read More »

check-your-widows-firewall-protect-your-online-security

Check your Windows Firewall: protect yourself and your information from hackers.

It might be important to mention from this point that the Windows default firewall may not be adequate enough to protect your computer from intrusion or anomaly. There is usually a need to combine this with other security solutions such as a reliable anti-virus and/or a host-based intrusion detection system. Going straight to the point,

Check your Windows Firewall: protect yourself and your information from hackers. Read More »

impact_of_excessive_social_media_on_mental_health_and_safety

Tips on Using social media more healthily {Part 2: Unhealthy use of Social Media}

We believe you have read part 1 of this article and have seen some of the unhealthy ways we use social media and some negative implications of this. If you have not read the Part 1 of Unhealthy use of social media, we recommend you do so as this is a summary of the 2 previous posts on the

Tips on Using social media more healthily {Part 2: Unhealthy use of Social Media} Read More »

impact_of_excessive_social_media_on_mental_health_and_safety

Unhealthy Use of Social Media {Part 1 Cont’d – Negative Implications}

This is a continuation of Unhealthy Use of Social Media and its negative implications. Click here to read the previous part of this article. Let’s dive right in. 5- Information about your family/personal life: did you know you can put your family also at risk by posting on your own social media? Yes, you can! However,

Unhealthy Use of Social Media {Part 1 Cont’d – Negative Implications} Read More »

impact_of_excessive_social_media_on_mental_health_and_safety

Unhealthy use of Social Media {Part 1-Negative Implications}

No doubt, social media has helped us all in various ways. From helping us market our services, to reaching more audience, to keeping up or reconnecting with friends/family, to entertainment and the list goes on. However, as we already know, life is binary. For one side, there is a corresponding other side. Here, we will

Unhealthy use of Social Media {Part 1-Negative Implications} Read More »

common_security_attacks_and_what_osi_layer_they_operate_cyber_security_protect_your_network_from_hackers2

Common Security Attacks and the OSI Layer They Operate

Layer 5 Session Hijacking: When users browse the internet, the web server sends a token to each user’s browser to identify the connection from each user. In a session hijacking attack, an attacker steals a valid session token to gain unauthorised access to a web server. Methods used by attackers to achieve this include a

Common Security Attacks and the OSI Layer They Operate Read More »