Amakiri Welekwe

Amakiri Welekwe

Amakiri is a UK-trained technology consultant and cybersecurity evangelist, working at the intersection of security, technology, and people. He has a master’s degree in network systems with over 10 years’ experience in managing IT services and infrastructure. He’s been writing about cybersecurity since 2013.

Articles by Amakiri

Thinking of selling or recycling your iPhone? It's important to make sure you wipe all of your personal data and information. We explain how to wipe an iPhone completely, before selling it.
By Amakiri Welekwe in VPN & Privacy on February 21, 2025
Thinking of selling or recycling your Android device? Make sure to delete your data so you're not handing personal information to a stranger. We explain how to wipe an Android phone or tablet fully.
By Amakiri Welekwe in VPN & Privacy on January 26, 2024
Many cyber attacks exploit buffer overflow vulnerabilities to compromise target applications or systems. Here's is what you need to know, and what you can do to secure your applications. 
By Amakiri Welekwe in Information Security on September 27, 2023
Immunity passports may seem like a natural fit at this time, but we have a duty to ensure that the underlying technology does not undermine our privacy rights and individual freedoms.
By Amakiri Welekwe in Information Security on August 14, 2020
Fraudsters often use emails, texts, phone calls, and pretexting scenarios to extract sensitive information. We reveal everything you need to know about pretexting attacks including examples and how to defend yourself.
By Amakiri Welekwe in Information Security on January 8, 2024
One of the key questions to ponder when using Google Drive cloud storage is: are my files secure and private? We take a closer look at Google Drive security, and offer steps you can take to improve it.
By Amakiri Welekwe in Information Security on September 21, 2023
Hacking incidents are on the rise. Most go undetected long before the victim realizes what happened. Here are 10 clear signs you can use to tell if your phone or computer has been hacked.
By Amakiri Welekwe in Information Security on December 13, 2023
Surveillance capitalism is here with us. Here's is what you need to know about it, and what you can do to defend your privacy and online identity.  
By Amakiri Welekwe in VPN & Privacy on July 21, 2020
To fully understand VLSM, we need to know the fundamentals. This tutorial explains what a subnet mask, subnetting, and supernetting are and how to implement.
By Amakiri Welekwe in Net Admin on November 14, 2024
Page 27 of 28