Author: Lynn Wandia

Nigeria: Facebook Founder Mark Zuckerberg is on a surprise Maiden Visit to Africa

Internet, social media
Facebook CEO Mark Zuckerberg is in Nigeria. News of his unannounced trip broke Tuesday with social media photos of him visiting the Co-Creation Hub (Cchub) innovation center in Lagos. Zuckerberg then visited Andela, a software developer accelerator, in which he and his wife’s foundation invested $24million earlier this year. It seems Zuckerberg travels a bit like the president, per CcHub CEO Bosun Tijani’s account. “Facebook told us a few weeks ago there would be a visit by the partnerships manager. Then they told us a few days ago it could be Mark, but it was all top secret until today,” he told TechCrunch. Zuckerberg met with coders in CcHub’s co-working space and then visited the incubation space, where he talked with reps from bookings startup Hotels.ng and LifeBank App, a digi
Nigeria and Huawei Sign MoU On e-Skills Development Project

Nigeria and Huawei Sign MoU On e-Skills Development Project

Internet, Women
Huawei, a leading global information and communications technology (ICT) solutions provider, and the Federal Government of Nigeria, have signed a Memorandum of Understanding (MoU) for Nigerian government officials to partake in and benefit from an e-skills development project entitled ‘Seeds for the Future’ programme. Reports Chima Akwaja Launched in 2008, Huawei’s ‘Telecom Seeds for the Future’ programme aims at cultivating local ICT talent, promoting knowledge transfer, improving people’s interest in and understanding of the telecom industry, and encouraging countries and regions to participate in the building of digital communities. The company is launching the programme for Africa’s most populous country, Nigeria, at a time the government is pushing hard to deepen ICT uptake, pen
Blackphone promises extreme Android-powered mobile privacy

Blackphone promises extreme Android-powered mobile privacy

Mobile
Surveillace is one of the biggest  threats to privacy and most individuals and organization who value privacy have taken deliberate steps to use available means to secure their privacy. The Blackphone is a smartphone being built to ensure privacy. It  was developed by  SGP Technologies  a joint venture between the makers of GeeksPhone and Silent Circle. Marketing is focused upon business users, stressing that employees often conduct business using private devices and services that are not secure and that the Blackphone service readily provides users with options that ensure confidentiality when needed. Blackphone provides Internet access through VPN. The telephone runs a modified version of Android called SilentOS that comes with a bundle of security-minded tools. On 30 June 2014, the B
Twitter to allow all confirmed users to apply for ‘verified’ Status

Twitter to allow all confirmed users to apply for ‘verified’ Status

social media
Twitter Blue-tick badges normally reserved for the accounts of high-profile figures are to be rolled out to all users who provide correct and confirmed information. An application process via an online form will now be available to every user of the micro-blogging site, Twitter said, adding that accounts “may be verified if determined to be of public interest”. Until now, the verification badge has been reserved for those accounts that were deemed “official”. Twitter described these as “public figures and organisations in music, TV, film, fashion, government, politics, religion, journalism, media, sports, business, and other key interest areas”. The move may help to reduce abusive behaviour on the site, as verified status will be offered only to confirmed accounts – anonymous ones will
Most Cyber-Attacks In East Africa Are Inside Jobs

Most Cyber-Attacks In East Africa Are Inside Jobs

Business, Cyber Security, Internet
75% of cyber-attacks in the East African region are caused by insiders, mostly disgruntled employee, according to William Makatiani, CEO, Serianu. As aptantech reports, what makes it worse is the fact that the content only has an approximate of 3,500 certified security personnel. Databases are the second most frequently targeted asset by people inside an organization. That was revealed by the 2016 Data Breach Investigation Report by Verizon Enterprise that was released a few months ago. Thus, data base administrators and security professionals need to take proactive measures to effectively protect their IT systems against cyber-attacks.  Janusz Naklicki, Oracle’s Senior VP for Africa, speaking at the Africa Security Summit in Tanzania said that the proactive approach is fundamental to