Just in Updates
-
World Radiocommunication Conference 2023 (WRC-23) Fellowship Application
World Radiocommunication Conferences (WRC) are held every three to four years to review, and, if necessary, revise the Radio Regulations, the international treaty governing the use
-
What you can do to Recover Hacked WhatsApp Account on Android
After you have discovered that your whatsapp has been hacked, this can be a distressing experience. It not only compromises your personal conversations and sensitive
-
How to Secure your WhatsApp Messenger Account
WhatsApp Messenger has become an indispensable part of our daily communication, allowing us to connect with friends, family, and colleagues effortlessly. As the popularity of
-
How to Recover WhatsApp Account with Phone Lost or Stolen.
If your phone gets missing, recovering your WhatsApp account takes completely different steps. In this case, you do not have access to your sim card
TECH TIPS
What you can do to Recover Hacked WhatsApp Account on Android
After you have discovered that your whatsapp has been hacked, this can be a distressing
TECHNOLOGY ARTICLES
Clandestine SIM-Linkage in Ghana: An Opinion on the Logic Flaw – Desmond Israel
Background For the past two weeks, I have followed some media stories concerning the linking of multiple phone numbers to national identity cards in Ghana
STRENGTHENING THE INTERNET: EXTENDING ENCRYPTION THROUGH PRIVACY PROTECTION FOR HEALTHY INTERNET IN AFRICA
Introduction: The Internet has become a way of life in the digital world. Within every minute in an hour, individuals connect online by sharing information
Dark Classrooms And Bright Minds : Internet Governance Education during a Pandemic
Alfredo Calderon, Dean of Virtual School of Internet Governance As we face another surge in the Delta variant within the Covid 19 pandemic, the traditional
Building sufficient digital value and trust
Value is the regard that something deserves importance, worth, or usefulness. It is also the principles or standards of behaviour—individual or collective. In ethics, value
Protection of Ghana’s critical information infrastructure in the cybersecurity act
Introduction Critical Information Infrastructure (CII), which is also referred to in some jurisdictions as critical national infrastructure or critical infrastructure, are institutions of a country
Child Online Protection (COP) related provisions in the Cybersecurity Act, 2020 (Part 2)
Every child must be shielded from violence, exploitation, and abuse on the web – UNICEF Child Online Protection (COP) may be a global challenge that
TECH INNOVATIONS
Harnessing Artificial Intelligence for Enhanced Information Security Risk Assessment and Threat Intelligence – Author: Gordon Fiifi Donkoh
Introduction In the constantly evolving landscape of cyber threats, maintaining
Meet Sam Altman, US College dropout who is behind ChatGPT as creator.
Sam Altman is a technology entrepreneur and investor. He is