Cyber Security

Kenya ICT Ministry urging massive investment in cyber security

Kenya ICT Ministry urging massive investment in cyber security

Cyber Security
Amid calls for regional harmonisation of cyber-crime laws, the government of Kenya is proceeding with the passage of a bill to address the growing problem of cyber-crime. The Kenya government is set to pass the Computer and Cybercrime Bill into law after its approval by cabinet as east African countries push for regional harmonization of cyber-crime laws. The bill is set to be tabled in parliament for debate and then go to a vote within the next few weeks. After that, it is expected to be signed by the president before the end of the year. According to the Kenya's ICT cabinet secretary, the Computer and Cybercrime Bill 2016 will target illegal access, online fraud, money laundering, phishing, cyber-stalking and child abuse, among other things. Cyber-criminals can only be guarded again...
Hackers Can Steal Your Passwords by Monitoring SmartPhone Sensors

Hackers Can Steal Your Passwords by Monitoring SmartPhone Sensors

Cyber Security, Mobile
An average smartphone these days is packed with a wide array of sensors such as GPS, Camera, microphone, accelerometer, magnetometer, proximity, gyroscope, pedometer, and NFC. According to a team of UK scientists , hackers can potentially guess PINs and passwords – that you enter either on a bank website, app, your lock screen – to a surprising degree of accuracy by monitoring your phone's sensors, like the angle and motion of your phone while you are typing. The danger comes due to the way malicious websites and apps access most of a smartphone's internal sensors without requesting any permission to access them – doesn't matter even if you are accessing a secure website over HTTPS to enter your password.  Smartphone apps usually ask your permissions to grant them access to sensors lik
Microsoft to block malicious links in Word, Excel and PowerPoint

Microsoft to block malicious links in Word, Excel and PowerPoint

Cyber Security, Technology
Microsoft has confirmed that at some time later this month, it will roll out a new security feature for some of its desktop apps for Office 365 ProPlus subscribers. Microsoft’s Advanced Threat Protection Safe Links feature, which protects its users from carelessly clicking over malicious links, is now being incorporated into Excel, PowerPoint and Word. Microsoft has already incorporated this safety feature in the desktop and mobile versions of its Outlook email client, and now some Microsoft’s most distinguished productivity apps are about to get it. After this feature has been installed, every time a user tries to follow a link having malicious content, a warning page is displayed in front instead of taking them directly to that location. After this, it is on users will if he wan
ESET Partners with Kenyan University to fight Cybercrime

ESET Partners with Kenyan University to fight Cybercrime

Cyber Security
Internet security company ESET East Africa has partnered with Kenya’s Strathmore University to set up a research and cyber-security operations centre (SOC) in Kenya. The Country Manager ESET East Africa, said the company will explore joint opportunities with like-minded partners and contribute assets in developing innovative cybercrime solutions targeting both blue chip businesses and Small and Medium Enterprises over the next one year. ESET East Africa he said has signed a memorandum of understanding (M.O.U) with the @iLabAfrica centre of the Strathmore University aimed at enhancing the fight against cybercrime in Kenya. Through this M.O.U, ESET said it will support Strathmore University’s current academic programs on cyber-security, through collaborative research and benchmarking approa
How companies can stay ahead of the cybersecurity curve

How companies can stay ahead of the cybersecurity curve

Cyber Security
While the tech world is abuzz with talk of the intelligent (IoT) devices that are supposed to revolutionize homes, another IoT revolution is underway in the workplace. Companies are turning to connected devices to improve day-to-day business functions but they have little choice but to embrace the technology that has become as ubiquitous as it is indispensable to life in 2017. Cyber attacks can interrupt business operations, hurting companies’ bottom lines, and can infringe upon the privacy and other human rights of consumers and the general public. Right now, there isn’t much regulation around companies’ cybersecurity practices. Managers must think in new ways about data, communications, business law and even the ethics of trading off potential corporate benefits against risks to