Exploring cybersecurity, privacy, and digital trust through stories, reports, and tutorials from our work and research across Africa.
Coordinated Subdomain Takeover Identified on NIMC Web Infrastructure
In the past few weeks, Web Security Lab has identified a pattern of suspicious activity affecting multiple subdomains operating under the National…
Read More
Exclusive: Nigerian Court Fines Polaris Bank ₦1 Million for Data Privacy Violations
Tokunbo Olatokun wanted two things: to close his account and stop receiving marketing emails from Polaris Bank. Instead, his inbox stayed cluttered, […]
Australia’s Social Media Ban for Under-16s: A Bold Step for Child Safety or a Precedent for Ending Online Anonymity?
On 28 November 2024, the Australian Senate passed a landmark law banning children under 16 from owning social media accounts, making Australia […]
LinkedIn Hit With $335m GDPR Fine
Microsoft-owned social network, LinkedIn has been hit with a $335 million fine by Ireland’s Data Protection Commission (DPC). The penalty, issued under […]
Exclusive: Inside the Globacom Cyberattack – Ransom Demand Revealed
In one of the most significant cybersecurity breaches to hit Africa in recent years, Globacom, Nigeria’s third-largest telecom provider, was hacked in […]
Cybersecurity in Africa: Rankings and Insights from the 2024 Global Index
As digital transformation continues to reshape economies worldwide, Africa finds itself in a pivotal position. The continent’s growing adoption of digital technologies […]
Will the .io Domain Survive? How Geopolitics Could Impact Tech’s Favourite ccTLD
The popular .io domain – widely used by tech startups, developers, and cryptocurrency companies – faces an uncertain future as the United […]
Massive Security Breach at Internet Archive Exposes 31 Million Users’ Data; Wayback Machine Under Attack
The Internet Archive has suffered a data breach, exposing sensitive information from approximately 31 million user accounts. The breach, confirmed late Wednesday […]
Encryption: Why the ‘Good Guys Only’ Backdoor is a Dangerous Myth
When Chinese hackers breached U.S. telecommunications surveillance systems, they didn’t need to create new vulnerabilities—they simply exploited ones that already existed. The […]
Chinese Hackers Infiltrate U.S. Telecommunications Surveillance Systems
In a shocking development, The Wall Street Journal reports that major U.S. telecommunications providers have fallen victim to a sophisticated Chinese cyber […]