Public Toilets, Public WiFis and other Free Things

You shouldn’t be any more comfortable with public WiFis than you are with public toilets. If you turn on the WiFi on your device right now, depending on where you are, you will find somewhere between three and perhaps a hundred available connections. Each of those connections acts as both mouths and ears, and there’s […]

Read More

Blessed are the Slow to Click

It is not an unusual sight to see a full-grown man, face buried in his device, happily clicking away like a child let loose in a toy store on Christmas Eve. Each new click adds to the excitement, and the cyclical arrangement of the internet ensures that his clicking won’t be ending any time soon. […]

Read More

Don’t Sleep Deep on Christmas Eve

For reasons that should be obvious, the staccato of gunfire is usually an unexpected interruption of the calm tunes of Silent Night, Holy Night or Kol Nidre, especially in areas that are hot for attacks or counterattacks. Timing is crucial in launching a successful surprise attack; the choice of time is as important as the choice of weapons […]

Read More

Blowing Up Your Own House Could be a Terminal Plan

Remote wipe is a functionality that enables you wipe off every shred of information on your device from a remote location. Typically, if your device gets stolen, some of the first things the new possessor would do would be to check for banking apps and other apps that can be used to perform financial transactions […]

Read More

A Loaded Pistol for Your 5th Birthday! (On Devices in the Hands of Kids)

It’s a sad picture in war-torn countries to see 10-year-olds holding riffles. As a matter of fact, in some of these countries, children could gather live ammos just playing on the streets. These armed children are meant to join in the defence of territories, mainly territories under the control of rebel groups. Whatever the narrative […]

Read More

Battle Protocols at the Gates (A Word on Login Forms)

When terrains get more and more unsafe, security checks will of necessity be multiplied. As I drive around certain regions in Sub-Saharan Africa, I encounter military checkpoints almost at every 3 miles. There are dos and don’ts at these checkpoints that guarantee the security of whoever it is that seeks passage. As cyberwarfare gets more […]

Read More

Hijacked

While we are still on gates and access, it would be good to look at the possibilities of being hijacked after you’ve made it through the gates. Normally, when you drive past the gates, your assumption is that you are safe; you don’t keep looking over your shoulders as you go about your business. Since […]

Read More

Become a Pro at Drowning Phishermen

From: [email protected] To: Femi Reis Dear User, You just requested a password change at PayPal.com. Please use the link below to reset your password. If this wasn’t you, please click here to report this activity and update your password immediately to avoid any possible compromise. Thank you for using PayPal. Such emails drop in my box […]

Read More