Sylvester UduosaSecuring the Internet of Things (IoT): Challenges and Best PracticesThe Internet of Things (IoT) has emerged as a transformative force, revolutionizing the way we interact with technology and the world…Jul 24, 2023Jul 24, 2023
Sylvester UduosaRansomware Recovery Plan In 10 StepsIf you are dealing with a ransomware incident, you may be working under extreme pressure, the ransomware may still be encrypting files, the…Jul 24, 2022Jul 24, 2022
Sylvester UduosaOWASP Top 10 2021 Quick List Review — SLYTECHWith the bubble of the Internet comes a plethora of flaws and vulnerabilities available at the disposal of threat actors. There’s a…Nov 11, 2021Nov 11, 2021
Sylvester UduosaRobinhood Trading App Suffers Data Breach of over 7 Million Users’ AccountRobinhood has disclosed a security breach incidence which took place “late in the evening of November 3” and affected over 7 million…Nov 9, 2021Nov 9, 2021
Sylvester UduosaOSINT: THE DOUBLE-EDGED SWORDOSINT is intelligence “drawn from publicly available material”, according to the CIA. Most intelligence experts extend that definition to…Oct 22, 2021Oct 22, 2021
Sylvester UduosaEver wondered how hackers takeover your social media accounts?As we evolve everyday, modes of attacks by cyber criminals also evolve however if we know how they operate then we’ll be able to protect…Oct 18, 2021Oct 18, 2021
Sylvester UduosaTWITCH DATA LEAKComing in few days after my article on the importance of Data protection, Twitch the popular streaming platform suffers a major leak of up…Oct 7, 2021Oct 7, 2021
Sylvester UduosaCustomer Service Desk: An Easy Access For Hackers To Exploit Your OrganizationThe Customer service week which holds every 1st week of the month of October has come to be recognized as the week we celebrate the…Oct 4, 2021Oct 4, 2021