Surveillace is one of the biggest threats to privacy and most individuals and organization who value privacy have taken deliberate steps to use available means to secure their privacy. The Blackphone is a smartphone being built to ensure privacy. It was developed by SGP Technologies a joint venture between the makers of GeeksPhone and Silent Circle. Marketing is focused upon business users, stressing that employees often conduct business using private devices and services that are not secure and that the Blackphone service readily provides users with options that ensure confidentiality when needed. Blackphone provides Internet access through VPN. The telephone runs a modified version of Android called SilentOS that comes with a bundle of security-minded tools. On 30 June 2014, the B
Twitter Blue-tick badges normally reserved for the accounts of high-profile figures are to be rolled out to all users who provide correct and confirmed information. An application process via an online form will now be available to every user of the micro-blogging site, Twitter said, adding that accounts “may be verified if determined to be of public interest”. Until now, the verification badge has been reserved for those accounts that were deemed “official”. Twitter described these as “public figures and organisations in music, TV, film, fashion, government, politics, religion, journalism, media, sports, business, and other key interest areas”. The move may help to reduce abusive behaviour on the site, as verified status will be offered only to confirmed accounts – anonymous ones will
75% of cyber-attacks in the East African region are caused by insiders, mostly disgruntled employee, according to William Makatiani, CEO, Serianu. As aptantech reports, what makes it worse is the fact that the content only has an approximate of 3,500 certified security personnel. Databases are the second most frequently targeted asset by people inside an organization. That was revealed by the 2016 Data Breach Investigation Report by Verizon Enterprise that was released a few months ago. Thus, data base administrators and security professionals need to take proactive measures to effectively protect their IT systems against cyber-attacks. Janusz Naklicki, Oracle’s Senior VP for Africa, speaking at the Africa Security Summit in Tanzania said that the proactive approach is fundamental to
In the most recent attacks in Europe, hackers are stealing credit card information through a malware that can spoof the user interface of Uber, WhatsApp and Google Play. The malware has struck Android users in Denmark, Italy and Germany and has been spread through a phishing campaign over SMS. Once it has been downloaded, it creates fake user interfaces on the phone as an overlay on top of real apps, and asks for credit card information which is then sent to the hacker. According to FireEye, a security vendor, since February they have observed 55 malicious programs in Europe that use a similar overlay technique. Earlier versions of the malware targeted banking apps however recent developments can spoof the interface to more popular software including WhatsApp and Google Play. Wu ...
SEACOM has added new Internet exchange points in Kampala (UIXP), Nairobi (KIXP) and Durban (NAPAfrica) to its list of peering agreements in Africa. A move that the telecom enabler and network provider says will further enhance the performance and reduce the latency clients will experience when they connect to Web services. The three peering points aren't the only ones that SEACOM added, it also added the Deutscher Commercial Internet Exchange (DE-CIX) in Marseille and France Internet Exchange (FranceIX) in Paris to the growing list of European Internet exchange points at which it peers. SEACOM’s IP transit network now offers African service providers and network operators direct connectivity to a range of small, medium and large partner networks in Europe. The company has PoPs in E