-

Top 5 CyberSecurity Groups on Facebook
Facebook is one of the top 10 social media platforms and the largest social media platform globally at 2.85 billion monthly active users worldwide, which accounts for more than 30% of the world’s population having access to the platform. Compiled in this piece in no particular order are the names of top 5 cyber security…
-

Network Orchestration
What is network orchestration? Network orchestration is the automation of networks across different types of infrastructure devices, network domains, and even multi-vendor systems with a network. In addition, orchestration can be policy-based or event-driven automation through the use of programmatic interfaces like RESTful APIs that are enabled by third-party software or a network infrastructure solution…
-
Data Privacy: Definition and Overview
The world has gotten so small, as information has become more accessible, shareable, and more vulnerable. Data privacy is the security of personal information from unwanted access by third parties and determines who has access to the information. Personal information like age, location, contact information in both real-time and online platforms are usually open to…
-
Malware forensic: An overview
If a simple action such as clicking on a link or opening an email can cause disastrous outcomes, then Malware and Malware forensic cannot be overlooked. In my last post, I explained malware, how it works, antimalware and antimalware tools. Check it out here for more understanding. What is Malware Forensic: Malware is the collective…
-
MALWARE: EVERYTHING YOU NEED TO KNOW ABOUT IT
Malicious Software popularly known as MALWARE is the collective name for any program or software that intentionally puts a computer, a server, a network or group data at risk. Malware is a set of code written or developed by cyber attackers with the aim of intentionally harming certain data set or gaining unauthorized access into…
-
Virtual Private Database: A practical approach: Column Level VPD
Column Level VPD In my previous post, we did a practical on how to perform Row-level restriction using VPD policies. This practical will focus on the Column level restriction. And as said earlier we will be using the HR sample schema. In this tutorial, we are going to secure some columns in the HR table…
-
5 steps to ensure a better home network security
A home network refers to a group of devices connected to each other and to the internet through either a wireless or wired network connection. Ensuring the home network security is strong and up to date is an important part of network security. In this short article I will be listing out 5 steps to…
-
Virtual Private Database: A practical approach
In our previous post, we learnt what the Oracle Virtual Database was all about. If you haven’t read it click here. Without wasting much of your time, let get busy with our practicals What is needed Working Oracle database (10g and above) HR sample schema. Sql work environment (SQL Navigator, Toad, etc) Today’s tutorial will look at the following types…
-
Social Engineering: The pervasive art of deception
Social Engineering like the term suggests refers to a diverse range of activities employed by malicious parties with the aim of luring unsuspecting victims to divulge sensitive information which will impact their online safety and might lead to financial loss. This tactic has been increasingly employed by malicious parties in recent years, as it is…
-
Exploiting the vulnerabilities in Oracle EBS user passwords with tips on how to protect against such exploits
A very nice reader asked if I could make a detailed post on how Oracle EBS user passwords can be hacked and extracted.This is a high risk and additionally a serious flaw on an Oracle EBS solution. Thus I decided to oblige and make the post. It is planned to be as easy to read as possible.Enjoy….. Also…
-
Understanding ARP Poisoning: A practical approach
ARP poisoning also known as ARP Spoofing is an attack on the network which allows the attacker to intercept network communication between the target computer and the network. This concept is called MAN-IN-THE-MIDDLE attack and it makes it easy to steal sensitive data like username and passwords, bank data etc.The man in the middle attack…
-
Open Source Tools in Cybersecurity
I have previously written on open source. Here is the link to that article, for more understanding. Today, I want to talk about open source tools. In this article I will discuss 10 open source tools that hackers and security researchers use to gather intelligence,before the real assessment or hacking is done. First, what are…
-
Oracle Human Resources Management System
Oracle Human Resources Management System (HRMS) is a major component of the Oracle E-Business Suite of applications.Simply put, It is an integrated suite of applications which supports every aspects of the HR function. There are several modules defined in Oracle HRMS eg Oracle Human Resources (HR),Oracle Payroll,Oracle Performance Management,Oracle iRecruitment,Oracle Time & Labor(OTL) etc.In this post…
-
Blockchain Oracles: What are they and how do they work?
In the past few articles, I have written about blockchain, smart contract, smart contract audit and cryptojacking. I saw it fit to do a piece on blockchain oracles and we will be exploring this topic on the borders of: What are blockchain oracles? Blockchain Oracles Use case Types of oracles The oracle problem Blockchain oracles…
-
Cryptojacking: what it is, how it works and how to prevent it.
In recent times, I believe the worst that can happen to anyone who trades, invests in cryptocurrency is Cryptojacking. I have written some articles about blockchain and smart contract, read more for better understanding on this topic. What is Cryptojacking? Let me break it down, the word cryptojacking was coined from two words Cryptocurrency and…
-
Beware!! Sim card cloning is possible: A simple but technical explanation
Mobile phones have transcended from just making calls to being used as a private vault. Nowadays mobile phones are used to store extremely sensitive data including authentication to corporate and personal emails and most especially banking credentials. A high proportion of bank customers now have mobile phone numbers linked with their bank accounts due to…
-
Auditing Smart Contract
I did a piece on smart contract where I detailed the basics of the technology, how it works, platforms that drive smart contract and its diverse use case. The article can be found here: Smart Contract. In this article, we will further explore smart contracts by considering the security. let us break down Auditing Smart…
-
How to extract WIFI passwords through Windows Command Prompt
Have you ever experienced the situation where you wanted to utilise wifi configured to connect to one machine in an entirely new machine, but couldn’t remember the wifi password?In today’s post we will be looking at how we can extract wifi passwords via command prompt.To get this done a utility will be used called Netsh. According…
-
Open source: 5 things you need to know about it to better your use of it.
Gone are the days when mentioning the use of Open source software was considered taboo in companies or business settings. Over time, it use has become acceptable, in fact, open source software is the first consideration when the need arises. While it is now acceptable, it may not be what it seems to be,…
-
Checking for windows update from Command Prompt
For security reasons, it is important to ensure that your system is properly secured by ensuring it has the necessary security updates/Patch required.This post will focus on how to identify the status of your patch update. It will be done through the command line A patch is a set of changes to a computer program…
-
Breaking down Adware
What is Adware? Are all online Adverts adware? There is nothing more annoying than seeing unwanted advertisement pop-ups while watching your favourite show, playing a game online either on your computer or your laptop. Adverts ranging from how to be a millionaire in seven days, to how to burn belly fat overnight, and a lot…
-
DDoS: What does it mean?
Distributed denial of service (DDoS) is an attack such that the source website of a company is bombarded with a lot of requests that are more than its capacity, which then affects the ability of the website to function properly. With the rapid recurrence of such attacks, many companies whose business model requires a massive…
-
Hacking: The untold truths about hacking
Hacking has been associated with a lot of things both legal and illegal. The common image that comes to mind when people hear hacking is that of an individual wearing a mask with a disturbed radio-like robotic voice, a laptop probably wearing a red or black jumpsuit with a lot of pizza boxes thanks to…
-
Evaluating Oracle Weblogic Middware Controls
WebLogic is Oracle’s proprietary application server. It is Java base and Inherited when it acquired BEA Systems in 2008.it’s used by many businesses to build and deploy enterprise applications. Weblogics popularity and widespread use has made it a target by malicious individuals.In this post, I will provide you with suggested control that can be implemented…
-
What is Honey pot in cybersecurity?
Honeypot calls to remembrance the Trojan Horse a concept first put to use in the Greek mythology. It’s an open gift that is part of a game plan. Due to the concurrent incidence of cyberattack, cybersecurity experts then thought of it. Why wait for them to attack first? Why don’t we attract them using a…
-
Insider threat and what you need to know about it
The unfortunate thing about threats, risk to your data, information and security is that it starts internally little wonder it is called an Insider threat. Most attacks on business security and information are not cases of a well designed malicious masks and glove wearing group called Hackers. What is an Insider Threat? An insider threat…
-
Static Code Analysis. An Introduction
Static code analysis is a method in computer program debugging that is done by examining the code without actually executing the program. The process provides an understanding of the code structure and can help to ensure that the code adheres to laid down standards.Automated tools can assist programmers and developers and auditors in carrying out…
-
Top 5 cybersecurity experts you must follow in 2021
Compiled in this piece in no particular order are the names of our top 5 cyber security experts you must follow if you are serious about cyber security in 2021.
-
An Introduction to Blockchain
An Introduction to Blockchain What is Blockchain technology? History of Blockchain Breaking things down Benefits of blockchain What does all this mean? What is Blockchain Technology? Blockchain is a system that makes recording of information foolproof, such that it is difficult to alter or cheat the system. It employs the use of a decentralized digital…
-

Oracle Database Security and Audit
Oracle database security and audit is important because oracles db is the most widely used database by most if not all organizations worldwide, from keeping records of customer data in banks, hospitals, etc, subscriber data and call logs by telecommunication companies to as big as keeping the entire identity record of citizens of a nation. Because…
-
4 Basic Reasons Your Security Spending is Unnecessarily High
Having a sufficient security budget is paramount to ensuring an organization’s cybersecurity program is well implemented. There’s every possibility for this budgetary figure to increase largely year after year and stakeholders keep wondering where all the money is going. In some cases, the money is well spent while in some, there’s no tangible value that…
-
Securing Active Directory Environments – Risk Concern
This post describes in detail the most common practices in securing any Active Directory deploment, in Enterprise environments
-
The Biggest Problems With Information Technology Audit, And How You Can Fix It
As technology and innovation maintains an upward thrust in our constantly evolving world of today, Information technology has rapidly become a very vital part of the growth of businesses at different scales and by extension the economy. The activities of Information technology is synonymous to that shiny Ferrarri f8 tributo that goes from 0 –100…





