Telecom Tariff Hike: How Consumers and the Government Can Cushion the Impact
The recent 50% hike in telecom tariffs, raising SMS costs from N4 to N6 and 20GB of data from N5,000 to N7,500, has placed an additional burden on Nigerian consumers…
The recent 50% hike in telecom tariffs, raising SMS costs from N4 to N6 and 20GB of data from N5,000 to N7,500, has placed an additional burden on Nigerian consumers…
As Nigerian banks undergo system upgrades to enhance their services, consumers may experience disruptions in banking operations. These upgrades, while essential for improved security and efficiency, can also present risks…
The payment technology sector and the banking industry are increasingly thriving on apps. This is why almost each of the 24 banks in Nigeria has an app for their customers…
Always remember! Mobile phones and the data they hold are very valuable to thieves — they hold so much important personal information of real and sentimental value. The following and…
The Federal Inland Revenue Service (FIRS) says it will begin to impose value-added tax (VAT) on online transactions, both domestic and international, with effective from January 2020. Babatunde Fowler, FIRS…
Culled from Which? All of the headphones, smartwatches and action cameras on the first page of Amazon results when sorted by average customer review were from ‘unknown’ brands – those…
Culled from: Which? Tech products from ‘unknown’ brands for sale on Amazon are littered with potentially fake reviews, an investigation by Which? has found. Of the hundreds of products analysed,…
Is online transaction safe today? It is a big question that has not only vanish the sleep of bankers and e-commerce consumers but has become the challenge for tech masters…
The theft of your device can happen at any time, so always be prepared. If you have an Android device, whether it is a phone or tablet, it is essential…
Hacking is finding a weakness in someone’s software or networks with the aim of exploiting something or gaining illegal access to secured data and information. For instance, hackers use a…