Shocking News on Fraud at Makerere University
It would be unreasonable to expect a student with the reading, writing and computing abilities of an eighth-grader to do well in college. If such…
<%= domainName %>
<% } %> <% if ( link_success && ! link_error ) { %><%= link_title %>
<% } %> <% if ( link_success && ! link_error ) { %><%= link_description %>
It would be unreasonable to expect a student with the reading, writing and computing abilities of an eighth-grader to do well in college. If such…
In 2013, two businessmen with various business operations in Kampala filed a case against a logistics firm. It was email fraud case. This case was…
Certified Network Defender is a hands-on, instructor-led network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and…
Familiarize yourself with the ATM machines of your bank especially the card slot entry area. This will help you notice anything that is out of…
Identity theft is when your personal details are stolen and identity fraud is when those details are used to commit fraud. What you do if…
The Journey of a thousand miles starts with a step In 2012, after I graduated from University of Dammam in Saudi Arabia, I knew that…
Every year when the telecom companies submit their financial statements, they are expected to give back 2% of the annual revenue to UCC. However, the…
Below is the presentation I made at Infosec 2014 seminar on 20th August 2014 at Hotel Africana Kampala, about the risks posed by social media.…
When it comes to personal security, how sure are you that you are not being hacked into? At a personal level, how do you ensure…
Please confirm you want to block this member.
You will no longer be able to:
Please note: This action will also remove this member from your connections and send a report to the site admin. Please allow a few minutes for this process to complete.