Author: Lynn Wandia

Nigeria and Huawei Sign MoU On e-Skills Development Project

Nigeria and Huawei Sign MoU On e-Skills Development Project

Internet, Women
Huawei, a leading global information and communications technology (ICT) solutions provider, and the Federal Government of Nigeria, have signed a Memorandum of Understanding (MoU) for Nigerian government officials to partake in and benefit from an e-skills development project entitled ‘Seeds for the Future’ programme. Reports Chima Akwaja Launched in 2008, Huawei’s ‘Telecom Seeds for the Future’ programme aims at cultivating local ICT talent, promoting knowledge transfer, improving people’s interest in and understanding of the telecom industry, and encouraging countries and regions to participate in the building of digital communities. The company is launching the programme for Africa’s most populous country, Nigeria, at a time the government is pushing hard to deepen ICT uptake, pen
Blackphone promises extreme Android-powered mobile privacy

Blackphone promises extreme Android-powered mobile privacy

Mobile
Surveillace is one of the biggest  threats to privacy and most individuals and organization who value privacy have taken deliberate steps to use available means to secure their privacy. The Blackphone is a smartphone being built to ensure privacy. It  was developed by  SGP Technologies  a joint venture between the makers of GeeksPhone and Silent Circle. Marketing is focused upon business users, stressing that employees often conduct business using private devices and services that are not secure and that the Blackphone service readily provides users with options that ensure confidentiality when needed. Blackphone provides Internet access through VPN. The telephone runs a modified version of Android called SilentOS that comes with a bundle of security-minded tools. On 30 June 2014, the B
Twitter to allow all confirmed users to apply for ‘verified’ Status

Twitter to allow all confirmed users to apply for ‘verified’ Status

social media
Twitter Blue-tick badges normally reserved for the accounts of high-profile figures are to be rolled out to all users who provide correct and confirmed information. An application process via an online form will now be available to every user of the micro-blogging site, Twitter said, adding that accounts “may be verified if determined to be of public interest”. Until now, the verification badge has been reserved for those accounts that were deemed “official”. Twitter described these as “public figures and organisations in music, TV, film, fashion, government, politics, religion, journalism, media, sports, business, and other key interest areas”. The move may help to reduce abusive behaviour on the site, as verified status will be offered only to confirmed accounts – anonymous ones will
Most Cyber-Attacks In East Africa Are Inside Jobs

Most Cyber-Attacks In East Africa Are Inside Jobs

Business, Cyber Security, Internet
75% of cyber-attacks in the East African region are caused by insiders, mostly disgruntled employee, according to William Makatiani, CEO, Serianu. As aptantech reports, what makes it worse is the fact that the content only has an approximate of 3,500 certified security personnel. Databases are the second most frequently targeted asset by people inside an organization. That was revealed by the 2016 Data Breach Investigation Report by Verizon Enterprise that was released a few months ago. Thus, data base administrators and security professionals need to take proactive measures to effectively protect their IT systems against cyber-attacks.  Janusz Naklicki, Oracle’s Senior VP for Africa, speaking at the Africa Security Summit in Tanzania said that the proactive approach is fundamental to
Malware That Pretends To Be WhatsApp, Google Play or Uber

Malware That Pretends To Be WhatsApp, Google Play or Uber

Cyber Security, Internet, Mobile, social media
In the most recent attacks in Europe, hackers are stealing credit card information through a malware that can spoof the user interface of Uber, WhatsApp and Google Play. The malware has struck Android users in Denmark, Italy and Germany and has been spread through a phishing campaign over SMS. Once it has been downloaded, it creates fake user interfaces on the phone as an overlay on top of real apps, and asks for credit card information which is then sent to the hacker. According to FireEye, a security vendor, since February they have observed 55 malicious programs in Europe that use a similar overlay technique. Earlier versions of the malware targeted banking apps however recent developments can spoof the interface to more popular software including WhatsApp and Google Play. Wu ...