Cyber Security Awareness
Public Group
Public Group
Active a week ago
Yaw Ababio and Krafo Systems bring awareness of the cyber security risks and trends.
Cybersecurity... View more
Public Group
Group Description
Yaw Ababio and Krafo Systems bring awareness of the cyber security risks and trends.
Cybersecurity is vital to national security because modern infrastructure, Business operations, and even human rights processes are increasingly reliant on digital systems, making them vulnerable to evil cyber-attacks that could disrupt critical functions, compromise sensitive information, and potentially destabilize a nation’s economy and digital dependent landscape.” to “Bringing awareness of the cyber trends and threat actors in the digital landscape of our online communities.
Group Feed
-
Yaw Pereko posted an update in the group
Cyber Security Awareness 8 months ago8 months ago (edited)
22,784
Abibisika (Black Gold) Points
Here’s a more detailed Message Apps comparison
Signal message app:
Security: Uses the open-source Signal Protocol, a highly respected and audited encryption protocol, ensuring only the sender and recipient can read messages.
Privacy: Collects minimal metadata, meaning Signal itself doesn’t store much information about your conversations,…
securemessagingapps.com
Secure Messaging Apps Comparison | Privacy Matters
This site compares secure messaging apps from a security & privacy point of view. These include Facebook Messenger, iMessage, Skype, Signal, Simplex, Google Messenger, Threema, Riot, Wire, Telegram, and Wickr
-
22,784
Abibisika (Black Gold) Points
“Smishing” texting are said to be targeting Android and iPhone.
Use safety measures such as end-to-end encryption as well as open-source code.
Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. We encourage all users to update to the latest version of Android where…
nordvpn.com
What is the best secure messaging app?
Not all encrypted messaging apps are as secure as you might think. Some hide a bunch of vulnerabilities that could easily expose your data and your identity.
-
174,915
Abibisika (Black Gold) Points
For those who have “smart speaker” devices that are listening for commands, be aware that those devices are always listening, and transposing all collected data to cloud storage. It is best, if you are having “serious discussion” to remove devices from…
techcrunch.com
Amazon’s Echo is ending its 'Do Not Send Voice Recordings' feature, starting March 28 | TechCrunch
Amazon Echo users will no longer have the option to process their Alexa voice recordings locally, which means those recordings (with the exception of
-
22,784
Abibisika (Black Gold) Points
Great information @bakari-kwento
I have seen and heard people say they all of a sudden getting advertisement on their Social Media sites and in their emails because of subjects they were having a conversation on with their friends.
Was that a coincident?
We have No Privacy when we take advantage of the latest technology just to subconsciously…
2
-
-
22,784
Abibisika (Black Gold) Points
PATCH TUESDAY!
The threats to our systems never end, but there are two that stood out to me this month.
The first involves the use of polymorphic extensions in Google Chrome. Devised by SquareX labs, there are a number of steps from getting the user to download a malicious extension to eventually exporting sensitive information, but the scary…
helpnetsecurity.com
March 2025 Patch Tuesday forecast: A return to normalcy - Help Net Security
Todd Schell from Ivanti gives his overview of February and forecast for March 2025 Patch Tuesday. Are you ready to get patching?
-
Yaw Pereko posted an update in the group
Cyber Security Awareness 9 months ago9 months ago (edited)
22,784
Abibisika (Black Gold) Points
For my security professionals following this channel:
API Security Matters
NOT the natural… API – Apple Pie Ingredient?
API – the DNA and gateway of web applications today.
What is an API?
APIs are mechanisms that enable two software components to communicate with each other using a set of definitions and protocols. For example, the…
- Load More

