Source: CIO East Africa The African Union’s Convention on the Establishment of a Credible Legal Framework for Cyber Security in Africa (AUCC) – which seeks to intensify the fight against cybercrime across Africa in light of rising incidences of cybercrime – has been the focus of debate recently. In view of this and to further shed light on online security issues in Africa, CIO East Africa sought the views of Ms Sophia Bekele, an internet security expert and international policy advisor over internet and ICT. Below are excerpts: 1. As regards the state of online freedom in Africa, what are the major issues surrounding online freedom of expression in Africa? What is the best way to empower users to stay safe online while protecting their freedom of expression? Technology-wise, A
Attack of the Tinder bots: 'malicious' download links found in dating app You might think you're chatting up an attractive human, but they could be a malware-toting algorithm. Called Alicia. Dating app Tinder is hugely popular around the world, with an estimated 4.2m daily users. Now those users are being warned that the service has been "invaded by bots" posing as humans. Security firm BitDefender has identified the bots, which pose as women to engage Tinder users in text-chat, before seeming to promote a mobile game called Castle Clash, posting a link to a website called Tinderverified.com which is not owned by or associated with Tinder. "The name of the URL gives the impression of an official page of the dating app and for extra legitimacy scammers also registered it on a rep...
Target is out with an update on its big data breach from before the holidays, and it turns out that much more customer information was compromised than the company originally thought. Target initially said 40 million customers' credit and debit card data was stolen, but now that number has risen to 70 million. The company also announced that it's not just credit and debit card information that was stolen, but customers' names, mailing addresses, phone numbers, and email addresses as well. The breach affects customers who shopped at Target in the U.S. between Nov. 27 and Dec.15. Stolen card information includes customers' names, card numbers, PIN data, and three-digit security codes. Sales have fallen at Target since the company announced the data breach. Target is now off
Over the weekend, news broke that tech giant Yahoo was serving advertisements that could allow hackers to gain control over users' computers. That's triggered concerns across the Internet about who's at risk, how users can tell if they've been affected and what people can do about it. Here's an explanation of what happned at Yahoo and how it might affect certain users. Wait, Yahoo was serving serving up malware? Yes. The security firm Fox-IT was the first to report the problem on Friday. Basically, users visiting yahoo.com were served ads from ads.yahoo.com. That part is normal. But some of those "advertisements" weren't actually ads. They were malicious software that redirected visitors to a Web site that attempted to take over their computers. If successful, the malicious software
Earlier this Month, Trustwave released their study on a massive botnet, one of many managed using the Pony botnet controller. The researchers gained control of the botnet, taking the place of its Command and Control server. Once in control, they discovered that the botnet had managed to steal about two million passwords from infected computers. They also discovered something that most of us already know: that people are terrible at passwords. Get To The Passwords The two million compromised accounts were spread between 1.58 million website credentials, 320,000 email logins, 41,000 FTP accounts, 3,000 Remote Desktop credentials, and 3,000 Secure Shell account credentials is a significant haul. The concern, of course, is how many of the affected users had selected the same password for o