MakeUseOf

Chris Odogwu-Staff Writer for Security

Chris Odogwu

Staff Writer for Security

  • 227
    articles
  • 185
    Features
  • 40
    Lists
  • 2
    Guides

About Chris Odogwu

Chris Odogwu is a writer and digital creator. With more than a decade of experience writing professionally, he’s versatile across several niches including cybersecurity, software as a service (SaaS), and digital marketing. 

Chris has built a successful writing career working remotely with reputable organizations. He holds a master's degree in mass communications with a concentration in public relations and advertising from the University of Lagos and a bachelor’s degree in mass communications from the University of Jos. He loves to read, dance and watch interesting movies. 

Latest Articles

Snake on a laptop
Snake Ransomware Endangers Your Data: How Can You Stop It?

Snake ransomware can have dire consequences, which is why you need to know how to spot and avoid it.

The face of a man wearing a hoodie
What Is GoodWill Ransomware and How Can You Stop It Infecting You?

Ransomware... for a good cause? GoodWill forces you into charitable acts, or you'll lose access to your data and/or system.

Lady sketching on an iPad
8 Ways to Secure Your Devices With Application Mapping

Any major app you use or create has its fair share of security flaws. Using application mapping, you can reduce the risk of hacks or data breaches.

Elderly woman holding a tablet against a mirror
Has Your Wi-Fi Been Hacked? Here’s How to Know and How to Prevent It

Cybercriminals can have dominance over your online activities by hacking your Wi-Fi connection. So how do you know if this has happened to you?

Woman worried as she looks at laptop screen
10 Signs Criminals Have Stolen Your Identity

Fortunately, your identity is still yours, and there are things you can do to convince the right people that you are the real you.

Man hold a fraud signage
What Is a Golden Ticket Attack? Stop Hackers From Having Complete Access to Your Data

Someone can do a lot of harm if they gain as much access to your data as you have. That's what makes this type of attack so scary.

Elderly man operating a tablet
What Is File Security? Why and How You Need to Protect the Files on Your Devices

Thieves want your private information, and your personal files are where they hope to find it.

Lady scrolling on an iPad outside
5 Ways You Abuse Authorized Access Privileges

Just because you have legitimate access to an account doesn't mean that hackers can't use that privilege to gain access too.

Woman staring at a smartphone with a finger in her mouth
What Are Dark Web Alerts? Know When Your Info Falls Into the Wrong Hands

The dark web gets its name because it's private and secretive, but there are ways to know when your data's going out to the highest bidder.

Elderly woman operating a smartphone
What Is Elder Fraud and How Can You Stay Safe?

Elders are among the groups of people most likely to get hit by a scam. It's not their wisdom crooks are after, but their wealth.

Woman holding a credit card and typing the details in a laptop
6 Ways Cybercriminals Can Steal Your Credit Card Details (and What You Can Do About It)

Credit cards are a convenient way to shop online. The same is true for cybercriminals, except they prefer to use someone else's card instead.

Hands holding a smartphone with the Tiktok logo on the screen
What Is Account Takeover Fraud? How Can You Prevent These Hacks?

Where hackers are concerned, you can't even trust messages from your family and friends. Here's why, and how you can fight back against hacks.

Woman operating a computer in a dark room
Who Is an On-Path Attacker and How Do They Operate?

There may be someone lurking on the path between your device and the one you wish to connect to. How did they get there, and what might they do next?

Lady in suite texting outside holding a drink
What Is Challenge Response Authentication Mechanism (CRAM) and Why Is It Important?

None shall pass! Unless they can first solve this riddle.

Man chatting on smartphone outside
What Are Google Chat Scams? How Can You Spot Them?

Many of us are aware of scammers operating on WhatsApp, Facebook Messenger, and more, but they're also active on Google Chat. Here's how to spot them.

Man looking stressed at work
What Is Security Debt and How Can You Stop It From Getting Out of Hand?

Vulnerabilites need to be addressed. Otherwise, they build up until you're stuck with too many flaws to fix and not enough time.

Worried woman on a laptop
8 Challenges of Application Security and How to Resolve Them

We all depend on app developers to take the necessary steps to keep our data safe.

Social login interface on a smartphone
What Are the Security Pros and Cons of Using Social Logins?

Instead of creating accounts on new platforms, you might decide to log in using Facebook, Twitter, or another social network. But should you?

Lady holding a smartphone with her hands
What Is Account Creation Fraud and How Can You Stop It?

Having a crook create a fake account in your name can be just as scary as having your identity stolen.

Lady pressing a phone in the dark
What Is a Multi-Factor Authentication Prompt Bombing Attack?

Are you getting lots of MFA notifications you didn't ask for? You could have been targeted by hackers. Here's what you need to know.

1 2 3 4 5
Page 1 / 12