According to Wikipedia, the concept of using a card for purchases was described in 1887 by Edward Bellamy.

Ever since credit & debit cards have been used to purchase goods, pay for services and so on.

However, considering the surge in cybercrime and technology innovations, bad elements came up with strategies on how to extort illegally from others using their debit/credit card.

They came up with card skimming devices to achieve this plan.

Card skimming is a method thieves use to collect data from your credit or debit card magnetic strip, at the time you use it. …

Credit: digitalguardian.com

Introduction

A threat is a communication intent to inflict harm or loss on another person. Intimidation is widely observed in animal behavior (particularly in a ritualized form) chiefly in order to avoid the unnecessary physical violence that can lead to physical damage or the death of both conflicting parties. A threat is considered an act of coercion.

Threat in relation to Cybersecurity

A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include computer viruses, data breaches, Denial of service (DoS) attacks and other vectors. …

COVID-19: LUCRATIVE FOR CYBER ATTACKS.

It is no longer news about the dreadful covid-19. For now there’s no specific solution though there has been tremendous improvement in tackling the pandemic.

It will also interest you to know that cyber attack is also booming as they have been several reported cyber attacks especially through email phishing and vishing.

Before you click that link with juicy offers. STOP! THINK!

Check the email address or the website properly. Also check for any grammatical error.

BE WATCHFUL AND STAY SAFE FROM CYBER ATTACK.

I got this message from a friend👇👇(picture below)

The offer seems interesting and juicy.

Should i check it out?

INNOVATIONS IN THE MIDST OF CRISIS.

Most events that occurs comes with a price either positive or negative. The current globalcrisis has crippled a lot of businesses and services.

However i see self dependence especially among developing nations . They believe in themselves and doing all they can to survive.

In events such as this, innovations tends to abound. Do you agree??

The picture📷📷 above caught my attention and proves that the world has innovative minds.

ANOTHER FINTECH MILESTONE IN NIGERIA.

It is no doubt that financial technology(fintech) has come to stay. The technology brought about tremendous impact in the financial sector.

Transactions are been carried out at a click thereby saving time and energy. However the cybersecurity of these innovations cannot be ignored.

The introduction of cashless policy by the apex bank (Central Bank of Nigeria) saw the explosion of several fintech services such as financial mobile apps, ATMs, POS etc. This reduced the rate of cash theft and also facilitated buying and selling among merchants and their customer’s.

Earlier this year in January, First…

Do you know that Life is precious and hence the need to safeguard it at all cost. Most times, lives are lost due to carelessness and negligence. When these happens, the families and loved ones of the victims are filled with sorrow, agony and utter despair.

Road traffic deaths and injuries occur in both the young and the old. According to WHO estimates for 2002, there were 180 500 children killed as the result of road crashes. Some 97% of these child road deaths occurred in low-income and middle-income countries. …

IT Devices: How safe are you ?

It is quite hilarious that our devices knows us more than we know ourselves.

Protection of data stored on these devices is very crucial.

Be on Guard. Protect your devices from unauthorized access.

#BeCyberAware

#Cybersecurity

#Protection

Cloud computing is a kind of internet-based computing that provides shared processing resources and data to computers and other devices on demand.

The Concept Of Cloud Computing:

The Concept of Cloud Computing came into existence in 1950 with the implementation of mainframe computers, accessible via thin/static clients. Since then, cloud computing has evolved from static clients to dynamic ones from software to services.

KNOWLEDGE ACQUISITION

It’s of no doubt that knowledge can be acquired from anyone irrespective of age, sex, nationality and educational background.

I was shocked after I was taught some photo editing skills (Adobe Photoshop) by a minor who has never seen the four walls of a University howbeit a Secondary school.

Photo editing using Photoshop has been a nightmare to me because of its complex tools and features. On several occasion I have tried learning it by watching video tutorial as well as consultation from books and other online sources.

I was a participant at the Skill Acquisition Entrepreneurship Development…

Obiaozu Kelechi

I love technology and excited about the opportunities it offers. Have any story? pop me up.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store