fbpx

Popular posts

I suspect someone is monitoring my Calls and SMS, Use these codes to STOP...

0
How To Cancel Call Divert/Forwarding On Android Phones Looking for how to cancel call divert or forwarding on Android phones? It is as simple as...

Why is it called a Type-C Charger?

0
One of the key benefits of USB-C is that it can deliver much more power than the older USB standards. This means that it can be used to charge larger devices such as laptops and even some electric cars
NBTE OFFICE

Convert your HND certificate to BSc through NBTE’s one-year programme using the following steps

0
The National Board for Technical Education (NBTE) has commenced a one-year HND to BSc top-up degree programme in Nigeria. This is following the official launching of an online portal for application into the programme.

Topfaith University set to commence medical science programmes

0
It already has a full-fledged Faculty of Law, Faculty of Engineering, Faculty of Management and Social Sciences, and Faculty of Computing and Applied Sciences.

Data Lifecycle Management: EXPLAINED

0
Data lifecycle management (DLM) is a policy-based approach to managing the flow of an information system's data throughout its lifecycle: from creation and initial storage to when it becomes obsolete and is deleted.

University of Uyo: 2024/2025 Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data Science programmes

0
Applications are invited from suitably qualified candidates for admission into PGD and MSC in Cybersecurity, Data Sciences at the University of Uyo, for the 2022/2023 academic session.
Digital Technology

The imperative of digital technology in accelerating business growth

1
In an ever-evolving marketplace, companies that embrace digital transformation gain a competitive edge, enabling them to adapt, innovate, and thrive.
phone theft

PHONE THEFT IN NIGERIA: THE BEST OPTION FOR RECOVERY

0
Security agencies have the technology to not only track the device's GPS location but also listen to conversations made through the phone, even if the phone SIM has changed (of course, the thief will change the SIM).
GRC

GRC Role: Some Interview Questions You Should Know

0
GRC in cyber security ensures there are clear rules (Governance), proactive identification and mitigation of risks (Risk Management), and adherence to regulations and standards (Compliance)

National Digital Economy and E-Governance Act 2024

0
The bill aims to create a legal framework for the digital economy in Nigeria and improve the way the government delivers services to citizens

Trends

Breaking: Find your lost Android Device when Disconnected from the Internet

2
...Introducing the New and Improved Find My Device Network for Android Users In a world where losing your devices and accessories can be a real...

Google pushes the boundary with its Pixel 9 series phones powered by Gemini A1

0
With exclusive features and technology, Google is poised to challenge Apple and Samsung's dominance in the premium brand device category.

Unlocking the Future of Mobile Connectivity: Understanding eSIM

0
An eSIM, short for embedded SIM, is a rewritable SIM card embedded directly into a device's motherboard. It allows users to activate and manage cellular plans digitally, without the need for a physical SIM card.

University of Uyo: 2024/2025 Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data Science programmes

0
Applications are invited from suitably qualified candidates for admission into PGD and MSC in Cybersecurity, Data Sciences at the University of Uyo, for the 2022/2023 academic session.

How Countries Block Citizens from Using Certain Application

0
The country’s internet service providers (ISPs) are instructed to block the IP addresses associated with the application’s servers.

The privacy of Personal Data of Nigerians is important – Destiny Young

0
Countries all over whole have one form of law or the other that regulates how personal data of their citizens are used by the tech companies.

Ikot Abasi as an industrial Hub in Akwa Ibom State; the Benefits of the...

0
Talent Pipeline: Industries can tap into the skilled workforce produced by the university, reducing recruitment costs and ensuring a steady supply of qualified professionals.

Chartered Member, the Computer Professionals Registration Council of Nigeria (CPN)

0
CPN is for Information Technology Professionals what COREN is for Engineers, and what ICAN or ANAN is for Accountants.

Impact of network congestion on packet switching and propose mitigation strategies

0
Network congestion happens when a network node or link is unable to handle the amount of data it's receiving, causing a reduction in service...

National Digital Economy and E-Governance Act 2024: THE DIGITAL TRANSFORMATION ERA

0
For effective execution of the provisions under this Act, there shall be established in every public institution an ICT Unit with such number of staff as may be required for efficient performance, effective service delivery, and digital transformation of functions in the respective public institution.

How Hackers Use Fake Facebook Copyright Infringement Flags to hack your...

0
If you receive a message saying your Facebook account has been blocked for copyright violation, don’t panic. It’s most likely just another phishing scam.

Edit a message on Facebook

0
You can edit an earlier message on Facebook, maximum allowable time lapse is 15 minutes

Dropbox Shares Your Files with OpenAI: How You Can Stop It

0
Dropbox CEO Drew Houston clarified in a thread on X (formerly Twitter) that this data-sharing happens only when users actively engage with the AI features.

Apple launches Stolen Device Protection for iPhone with iOS 17.3 beta,...

0
Apple has thoughtfully created a two-tier system of how Stolen Device Protection works that offers a balance of user-friendliness while enhancing security.

Mobile Safety: Ripping Through Technology | Destiny Young

0
Mobile phones have become an essential part of our lives. However, with the increasing use of mobile phones, the risk of cyber threats has also increased. Therefore, it is essential to take mobile safety seriously.

WhatsApp lets you hide your IP address on calls

5
To activate the IP hiding feature on WhatsApp, go to Settings, then Privacy. Tap Advanced, and turn Protect IP address in calls on or off.

How to enable Two-step verification on your Whatsapp

0
Adding an email address on two-step verification will allow WhatsApp to send you a link via email to disable two-step verification in case you ever forget your six-digit PIN, and also to help safeguard your account.

10 valuable tips to converse your Mobile Data Usage

1
Turn off auto-play and auto-download. Many apps have features that automatically play videos or download content in the background. These features can eat up a lot of data, so it's a good idea to turn them off.

Google pushes the boundary with its Pixel 9 series phones powered...

0
With exclusive features and technology, Google is poised to challenge Apple and Samsung's dominance in the premium brand device category.

Android: You can now transfer your eSIM to another Android phone

0
The tool also has the option to convert a SIM to an eSIM, so you may be prompted to do so if you insert a physical SIM into your phone.

Features updated with iPhone iOS Version 17.3

0
Stolen Device Protection is Apple's hopeful solution to the problem. Apple says the feature is designed to add an additional layer of security in the event someone has stolen your iPhone and also obtained the device's passcode.

PHONE THEFT IN NIGERIA: THE BEST OPTION FOR RECOVERY

0
Security agencies have the technology to not only track the device's GPS location but also listen to conversations made through the phone, even if the phone SIM has changed (of course, the thief will change the SIM).

Breaking: Find your lost Android Device when Disconnected from the Internet

2
...Introducing the New and Improved Find My Device Network for Android Users In a world where losing your devices and accessories can be a real...

Google pushes the boundary with its Pixel 9 series phones powered...

0
With exclusive features and technology, Google is poised to challenge Apple and Samsung's dominance in the premium brand device category.
Facebook

How Hackers Use Fake Facebook Copyright Infringement Flags to hack your account

0
If you receive a message saying your Facebook account has been blocked for copyright violation, don’t panic. It’s most likely just another phishing scam.
Facebook

Edit a message on Facebook

0
You can edit an earlier message on Facebook, maximum allowable time lapse is 15 minutes
Dropbox

Dropbox Shares Your Files with OpenAI: How You Can Stop It

0
Dropbox CEO Drew Houston clarified in a thread on X (formerly Twitter) that this data-sharing happens only when users actively engage with the AI features.
iPhone Stolen phone feature

Apple launches Stolen Device Protection for iPhone with iOS 17.3 beta, here’s how it...

0
Apple has thoughtfully created a two-tier system of how Stolen Device Protection works that offers a balance of user-friendliness while enhancing security.
Cyber safety

Mobile Safety: Ripping Through Technology | Destiny Young

0
Mobile phones have become an essential part of our lives. However, with the increasing use of mobile phones, the risk of cyber threats has also increased. Therefore, it is essential to take mobile safety seriously.

Latest articles

I suspect someone is monitoring my Calls and SMS, Use these codes to STOP...

0
How To Cancel Call Divert/Forwarding On Android Phones Looking for how to cancel call divert or forwarding on Android phones? It is as simple as...
National Universities Commission

BREAKING: NUC Restructures Nigerian Universities Computing Programme into Distinct Disciplines; Cybersecurity, 6 Others

0
Quite notable is the splitting of Computing into Cybersecurity, Software Engineering, Data Science, Information and Communication Technology, Information Technology, Information Systems, and Computer Science
META

Nigerian content creators to earn through Facebook, Instagram June 2024

1
Clegg expressed gratitude to President Tinubu for facilitating an executive order crucial to the landing of Meta-backed deep-sea cable infrastructure in Nigeria.

University of Uyo: 2024/2025 Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data Science programmes

0
Applications are invited from suitably qualified candidates for admission into PGD and MSC in Cybersecurity, Data Sciences at the University of Uyo, for the 2022/2023 academic session.

Why is it called a Type-C Charger?

0
One of the key benefits of USB-C is that it can deliver much more power than the older USB standards. This means that it can be used to charge larger devices such as laptops and even some electric cars

Elon Musk unveils Tesla LunaRoof: AI solar panel to generate electricity from moonlight

0
One of the major problems with conventional solar power systems is that they are only able to generate solar power at certain times of the day, and only when the sky is as free of clouds as possible.

BREAKING: NBTE (HND to BSC) one-year top-up degree commences officially in Nigeria

2
With your HND, do a one-year top-up to a BSc degree from a global university at the comfort of your home.
GRC

GRC Role: Some Interview Questions You Should Know

0
GRC in cyber security ensures there are clear rules (Governance), proactive identification and mitigation of risks (Risk Management), and adherence to regulations and standards (Compliance)
NBTE OFFICE

Convert your HND certificate to BSc through NBTE’s one-year programme using the following steps

0
The National Board for Technical Education (NBTE) has commenced a one-year HND to BSc top-up degree programme in Nigeria. This is following the official launching of an online portal for application into the programme.
FUTIA

AN OPEN LETTER TO THE AUTHORITY OF FEDERAL UNIVERSITY OF TECHNOLOGY (FUTIA), IKOT ABASI

1
RE: BSc (Hons) in Cybersecurity I would like the Authorities of Federal University of Technology Ikot Abasi (FUTIA) to apply for approval from National University...

Education trends

National Universities Commission

BREAKING: NUC Restructures Nigerian Universities Computing Programme into Distinct Disciplines; Cybersecurity, 6 Others

0
Quite notable is the splitting of Computing into Cybersecurity, Software Engineering, Data Science, Information and Communication Technology, Information Technology, Information Systems, and Computer Science

University of Uyo: 2024/2025 Postgraduate Admissions into (PGD/Masters) in Cybersecurity, Data Science programmes

0
Applications are invited from suitably qualified candidates for admission into PGD and MSC in Cybersecurity, Data Sciences at the University of Uyo, for the 2022/2023 academic session.

BREAKING: NBTE (HND to BSC) one-year top-up degree commences officially in Nigeria

2
With your HND, do a one-year top-up to a BSc degree from a global university at the comfort of your home.
NBTE OFFICE

Convert your HND certificate to BSc through NBTE’s one-year programme using the following steps

0
The National Board for Technical Education (NBTE) has commenced a one-year HND to BSc top-up degree programme in Nigeria. This is following the official launching of an online portal for application into the programme.
FUTIA

AN OPEN LETTER TO THE AUTHORITY OF FEDERAL UNIVERSITY OF TECHNOLOGY (FUTIA), IKOT ABASI

1
RE: BSc (Hons) in Cybersecurity I would like the Authorities of Federal University of Technology Ikot Abasi (FUTIA) to apply for approval from National University...