Exploring cybersecurity, privacy, and digital trust through stories, reports, and tutorials from our work and research across Africa.
How a Pizza Order Sparked Nigeria’s Landmark ₦3 Million Data Privacy Victory
Young lawyer's fight against unsolicited marketing messages became a landmark victory for digital rights in Africa's largest economy.
Read More
CrowdStrike: How One Company Caused The Biggest IT Outage In History
In April 2024, the news of the XZ backdoor took the IT ecosystem by storm as we were whiskers away from what […]
Nigeria’s Data Protection Watchdog Collects $266K in Fines
The Nigeria Data Protection Commission (NDPC) has announced that it has collected $266,000 (₦400 million) in fines from seven companies for data […]
Getting Started with Basic Linux Commands
Linux is an operating system, just like Windows and Mac OS. It’s a special kind of operating system because it is not […]
Microsoft to End Support for Windows 10 by October 2025
Microsoft has revealed plans to discontinue support for Windows 10 by October 2025. This move marks a significant milestone in the tech […]
How I Downloaded Malware Onto My PC
A few days ago, my PC was infected with malware and here’s how it happened, including everything that transpired in a slide […]
Round-Robin DNS (RRDNS) Explained
Round-Robin DNS is a load-balancing method that operates on the DNS level by distributing incoming traffic across multiple servers or IP addresses […]
XZ Backdoor: What Could Have Been The Biggest Cybersecurity Breach In Recent Times
There was widespread surprise within the cybersecurity and open-source software community last week when news broke out that recent versions, 5.6.0 and […]
CompTIA Security+ vs Cisco CyberOps: A Comprehensive Comparison
CompTIA Security+ and Cisco CyberOps are two popular cybersecurity certifications in the industry. Both certifications provide professionals with the knowledge and skills […]
Let’s Talk Regex in 60 Seconds?
Regular expression falls into the category of skills that would benefit developers, security analysts, and system admins to pick up as early […]