
Security




5 email providers that offer end-to-end encryption
In this Google/ Android Era, every Tom, Dick and Harry you know does have a Gmail account. It's become so cliche that for most people out there, it's become synonymous to Email. For the rest of us however, we know that Gmail isn't the only... Read More

Advertisement




RAMpage Is The Latest Security Problem That Affects All Android Devices Since 2012
Android devices could be exposed to a newly discovered vulnerability called the RAMpage. The exploit could theoretically work on any device with LPDDR memory(Low Power Double Data Rate memory), which includes virtually every smartphone released since 2012. How does it work? Dubbed the RAMpage, the... Read More

VPNs aren’t OTT services but will still be blocked unless you pay OTT Tax in Uganda
Whatsapp groups I subscribe to are dead silent you could hear a pin drop. That's evidence that the Social Media or OTT tax is now in full effect in Uganda. But according to multiple reports, defiant Ugandans are turning to Virtual Private Networks(VPNs) to bypass... Read More

Advertisement



What’s end-to-end encryption in Chat and voice apps
As the world gets more cautious on matters cyber-security, certain terms get thrown around a lot. One such term is end-to-end encryption, aptly abbreviated as E2EE. Encryption is the process of converting information or data into a code, especially to prevent unauthorized access. End-to-end encryption,... Read More




Advertisement

An Idiot’s guide to creating strong passwords
Recently, there has been a trend of hacking over the internet. This even prompted Twitter to ask its users to change their passwords to guarantee their online safety. A password is a string of characters used to log in to a computer or network in... Read More

Correctly Configure Two-Factor Authentication before you’re locked out of your own account
Granted Two-Factor Authentication or 2FA might make your Gmail or Facebook account less likely to be hacked into prying eyes. 2FA bulletproofs your account against unauthorized users, but when you the owner of the account gets denied your own data, then it's not useful anymore. I... Read More



Advertisement
Advertisement