Showing posts from 2022

Have You Restricted Your Google History?

The internet and search engine giant, Google, has proliferated the digital world such that it has become difficult to sidestep their persistent presence. Admittedly, we all continue to use google products packaged in different forms. From google chrome to maps and a plethora of other dependent and integrated apps, Google has become the giant David can no longer sling down. While other search providers such as Microsoft’s Bing, Yahoo, Yandex, or Baidu exist, Google is by far the most used search engine.  Google’s dominance is by no chance breaking news. By now, we all know that Google collects user data for different purposes including marketing and “improvement” of service delivery. The caveat is that most of us do not know that we can opt-out of wanton data collection and retention. while Google will continue to footprint our activities in many ways as aided by wide cross-platform outreach, doing what we can with what we have can certainly go a long way toward limiting data collecti

Top 5 Things you are probably doing wrong with your phone - A cybersecurity perspective

Since the invention of the first smartphone in 1992 , humanity has raced to acquire the latest gadgets on the market. Smartphone makers have equaled the challenge to satisfy a technology-hungry population that now accounts for over 6.5 billion smartphones globally. While this technology adoption has largely been beneficial to globalization and economic development, it has become a source of security risk.  I previously wrote an article about the proliferation of mobile phone viruses and how to take care of them . Even so, old habits die hard. You still need to consider whether some of your tendencies make it easy for attacks and unauthorized access. Below are what I consider the most common mistakes people do with their smartphones to the delight of the bad guys; 1. Implementing easy device security settings The first entry point to a smartphone is the screen lock that requires a pattern/pin/fingerprint/password to unlock. People assume that since they have little to lose or hide, t

Still think strong passwords are overrated? Think twice!

A few months ago, I wrote about various ways attackers could make attempts on your passwords for nefarious purposes. In case you did not read it, do so here right away.  Since then, have you really cared to reinforce your passwords to conform to best practices? Some of the discussed password strengthening strategies I highlighted included using unique passphrases that are a mix of 8 characters or more, not recycling passwords for use in more than one site, and using password managers in case you feel overwhelmed by the number of passwords you need to cram and/or use.  In case you are not convinced that you need to have really good passwords, let me make an attempt to crack a deliberately weak WIFI password from one of my routers. To do this, I will set a generic password i.e. password123 as my WIFI password, and then attempt to crack it.  While practical, this article is for demonstration purposes. Never attempt to crack passwords at your workplace or target devices and infrastructure

Basic tools for Open Source Intelligence (OSINT) and Cybersecurity

With increasing application of technology across different domains world over, information has become the new oil upon which organizations base their business strategies. Alongside the proliferation of technology and a myriad of increasingly significant fields such as data science, more and more organizations are becoming cognizant of the enormous advantages data and information can present. While organizations will feel the need to protect their assets with greater urgency, even the least of tech savvy individuals can make use of tools and technologies that make it easy to at least  muster the basics of information acquisition.  This article is for groups of people who may want to know the general basics of information gathering from freely accessible sources (OSINT). Whether you are a doctor or a mason, information gathering will ultimately be important in building a knowledge base vital for both personal and professional use. By extension, any individual would naturally be interest