fb pixel

Security

10

How to stop Facebook videos From Auto-Playing

Facebook, like many other social media platforms, displays autoplay videos on its homepage, but it also provides an option to disable automatic video playback on mobile devices, such as Android and iOS, as well as on the web. The ability to have videos play automatically on Facebook is useful if you want to relax in […]

Okunloye Abiodun Segun
10

LMPS Launches First Moroccan Cyberdefense Product

The CyberSecurity firm, LMPS Group on Monday announced in a press release the introduction of the first ever Moroccan-made cyberdefense solution for companies and organizations called “Managed Detection & Response” (MDR) which is backed with artificial intelligence, making it relatively autonomous. LMPS as a “Cybersecurity one-stop-shop” has set up the first turnkey “Managed Detection & […]

Okunloye Abiodun Segun
11

The website of Bet9ja has been hacked by the Russian Blackcat gang

Bet9ja’s management has stated that their website was hacked by the Russian Blackcat gang. Bet9ja revealed this in a statement, identifying the attackers as the Russian Blackcat organisation, which is known for multiple attacks on large corporations throughout the world. The gaming site stated that the hacker gang had already sought a ransom, but it […]

Staff Writer
6

Nigerian Mobile Carriers Block 75 Million Unlinked SIM Cards

Over 75 Million Unlinked SIM Cards have been Blocked by Nigerian Mobile Carriers in the ongoing National Identification Number (NIN) linkage exercise as they enforce the government order following the recent kidnapping and killings that occurred along the Abuja-Kaduna rail track among other recent security breaches along that axis and Kaduna state in particular. To […]

Babalola Seun
10

Hackers Send Fake, Data Breaches Notifications To Trezor Users

Hackers targeted Trezor, a cryptocurrency hardware wallet. They used the company’s mailing list to send out fake data breach notifications to users. Mailchimp, a well-known email marketing platform, has confirmed that hackers used an internal tool to steal data from more than 100 of its customers, with the information being used to launch phishing attacks […]

Okunloye Abiodun Segun
10

Anonymous hacker group Communicate with Russians Through Printer Attacks in Anti-Putin Battle

The Anonymous hacker group has taken the responsibility of informing the people of Russia about the Invasion of Ukraine. After declaring war on Russian President Vladimir Putin, Anonymous, a decentralized international activist, and hacktivist group has been relentless in its attacks on the Kremlin, undermining the country’s leadership and disrupting the country’s narrative on the […]

Okunloye Abiodun Segun
10

Lapsus$ Hackers Group Leak nearly 200 Gigabytes of Samsung Source Code In Cyber Attack

Lapsus$ Hackers Group at it again as nearly 200 gigabytes of data, including the source code for numerous technologies and algorithms used in biometric unlocking operations, have been reported stolen and exposed by hackers. The stolen data allegedly contains confidential information from Qualcomm, a US chipmaker that supplies chipsets for Samsung handsets sold in the […]

Okunloye Abiodun Segun
8

Technology in Nigeria’s Piracy Fights: What Somalia Can Learn

The Gulf of Guinea previously worn the title of the region with the highest rates of piracy attacks globally in the shipping corridor for years. The 5,000-nautical mile (nmi) coastline of the wider Gulf of Guinea offers seemingly idyllic conditions for shipping. It has numerous natural harbours and is largely free of weather-related chokepoints. It […]

Staff Writer
11

The NCC CSIRT Discovers Malware That Targets Banking Applications

Software that steals Android users’ banking app login information has been made by the Nigerian Communications Commission’s Computer Security Incident Response Team (CSIRT). The CSIRT has found it. According to a security advisory from the NCC CSIRT, the malicious software known as “Xenomorph” has a high impact and a high vulnerability rate. It was discovered […]

Staff Writer
11

A Trojan horse for Android devices called Xenomorph has the ability to compromise over 56 different financial apps.

Threatfabric, an online fraud detection business, recently disclosed that over 50,000 Android users have installed a Trojan that is capable of targeting over fifty-six banking apps. The Xenomorph, an alien species, inspired the name of this malware. At the moment, it only offers a few possibilities. However, the trojan appears to be in its early […]

Staff Writer
10

Security alert: NCC warns against software that steals banking app data

The Nigerian Communications Commission, an independent regulatory authority for the telecommunications industry in Nigeria has alerted Nigerian against software targeting users’ banking app information. According to NCC spokesman Ikechukwu Adinde in a statement released on Sunday, the Nigerian Communications Commission has found newly-hatched malicious software that steals Android users’ banking app login information. NCC’s Computer […]

Okunloye Abiodun Segun
2

The deadly cyber Russia-Ukraine war

As reactions trail the invasion of Ukraine by Russia, the technological dimension continues to emerge by the day. Cyberspace has become another platform for this war. Both countries continue to experience diverse adversarial attacks and consequences technologically and within their respective cyber ecosystem.  As reported earlier this week by Techpression, the Russians have been accused […]

Pelumi Apantaku
2

Cybercrime in Nigeria: Increasingly Sophisticated Crimes Part 2

This is the second part of the Cybercrime in Nigeria series.  Read: Cybercrime Typology in Nigeria: A Sign of Industrialisation (Part 1) Nigerian crime now is abandoning pedestrian fraud-related crime that requires little or no technical skills. According to Statista, the country has 8th internet penetration rate, with 49 per cent of the country having […]

Pelumi Apantaku
10

How to locate your Android phone IMEI number

You might have been wondering, what is IMEI number and what is it used for? Don’t worry, it will be explained here. About IMEI number. Every phone no matter how cheap or expensive it might be will have an International Mobile Equipment Identity (IMEI) number. The IMEI number is a 15-digit unique identifier that can […]

Okunloye Abiodun Segun
11

The Russian Cyber Attack on Ukraine

Ukraine has been hit by cyberattacks that are feared to be backed by President Putin of Russia. The distributed denial-of-service (DDoS) attacks were targeted at the web portal of Ukraine’s ministry of defence as well as the country’s financial systems. The scope of the DDoS attack is such that hackers flood the servers hosting a […]

Staff Writer
11

Google Chrome Vulnerability

Users of Google chrome have been urged to update their browser as unpatched weaknesses in the software is being exploited by hackers. These vulnerabilities can lead to data corruption and the execution of arbitrary code on vulnerable systems. Tracked as CVE-2022-0609 and rated high severity, the exploited vulnerability is described as a use-after-free vulnerability issue […]

Staff Writer
8

Google Expands Two-Step Verification To Protect Internet Users

Google announced the expansion of its two-step verification (2SV) process for logins to enhance account security after its newly introduced two-step verification initiative saw a 50 percent drop in account breaches for 150 million Gmail accounts and two million YouTube creators accounts. Google accelerated its efforts in 2021 to eliminate password threats by enrolling users […]

Staff Writer
2

Cybercrime Typology in Nigeria: A Sign of Industrialisation Part 1

Over the years, cybercrime in Nigeria has been equated to fraud on the internet. It is the only country where an internet crime was attributed to “the Nigerian scam”. A global perspective that Nigerian cybercrimes are only concerned with fraud has influenced the policing and focus of other law enforcement. It is also generally believed […]

Pelumi Apantaku
11

IOS or ANDROID Which is Safer from Cyber Attack?

The fear that you would wake up one day and your phone would no longer be yours to control is a valid fear especially with how hackers so easily take over social media accounts even though these companies are constantly upgrading their security systems. Experts have said that security systems on computers are better than […]

Staff Writer
2

Cyberattacks Ravages European Oil Companies

European major oil transport and storage companies are battling with cyber-attacks. Companies including Evos (Netherlands), SEA-Invest (Belgium), and Oiltanking (Germany) are witnessing the disruption of their IT infrastructure. These attacks are having a global effect, with about a dozen terminals being affected. The affected companies confirmed its occurrence in the last few days.  According to […]

Pelumi Apantaku
Advert