Dolapo just received an sms on her phone, saying someone else tried to login to her gmail account with another device. Here's how she did it
Dolapo is very careful about whom she shares information with on social media. She has, also attracted unwanted interest from the security services, based on what she posts and has received countless failed login attempts to her Facebook account. Here's how you can prevent this from happening to you.
Chidinma has been tweeting about the awareness campaign but she noticed an offensive tweet from her account that she didn't create. She becomes worried as she had ignored Nasir's advice to use 2 Step Verification for her account.
Nasir uses twitter when he’s on the go. it's how he shares links and connects to other sectors in the country. So he has to ensure he isn't giving away too much information through his privacy settings.
Whenever Nasir is hanging out with his friends, he posts a lot of photographs and checks in from different places they visit.His friends tell him to be careful about sharing too much sensitive information. He realises they're right, and now wants to find out the best way to manage his social media settings.
Chidinma got a Friend request on Facebook posing to be a sponsor she had be following up on. She doesn't get too excited but pauses to review the profile of the sponsor before accepting.Turns out to be Fake.
Nasir has been working on investigating AGA. He has gathered lots of evidence and saved it on his computer. Few days before giving his presentation to his editor in chief his computer crashed and he has lost all his documents and project. He could have backed the documents up before the computer crashed.
Chidinma worries that downloading all of the interesting apps she finds on her two phones also brings with it a high risk of them being infected with malware or spyware of some kind. To put her mind at ease, she does a little research about the incidence of such events.
Nasir and Dolapo are working together to track the activities of AGA on social media. They need to build up a case so law enforcement agencies can clamp down on AGA. How do they go about this, without contravening the Nigerian Cybercrime Act 2015
Chidinma wants to send documents containing sensitive data to Nasir but isn't sure how safe they'll be in transit. She decides to read up to learn how she can prevent malicious users from intercepting the email en route to the intended recipient.