Wednesday, May 23Always On-point

Security

Nearly half of U.S. teens prefer Snapchat over other social media

Nearly half of U.S. teens prefer Snapchat over other social media

Security, Social Media, What's Hot
Snapchat is more popular among U.S. teens than ever, according to new research from investment firm Piper Jaffray. The company surveys teens in the U.S. about their media habits every spring and fall. This fall’s survey found that 47 percent of surveyed teens say Snapchat is their preferred social media, up from 39 percent in the spring. Way back in the spring of 2015, Snapchat was their least preferred social media platform. And Instagram hasn’t been the most popular platform since 2015, according to the survey data. Recently Snapchat has seen increased pressure from Instagram, which, along with parent Facebook, has been copying Snapchat’s features. The move has been paying off as Instagram has eaten away at Snapchat’s share of new users in the U.S., according to data from Adobe.--r
Social media South Africa 2018, are we ready?

Social media South Africa 2018, are we ready?

Media, Security, Social Media, What's Hot
I recently attended Arthur Goldstuck's presentation on the SA Social Media Landscape 2018. From research conducted by World Wide Worx and Ornico, 118 of South Africa's largest businesses shared information on their social media, digital strategy and future plans. What stood out for me was the potential for brands on YouTube. Plus a bigger question, are some businesses still not prepared for social media integration? For someone in the industry it was heartening to see the positive growth statistics of social media in South Africa over the last year. What’s gone up? Facebook is now used by 97% of big business, a rise from 91% in 2016, Instagram from 62% to 71.6% and LinkedIn from 63% to 71.6%. Corporate blogs grew from 24% to 36% this year and we can look forward to 8% more businesses ad
Bitcoin’s rise in African markets is driven by an old Russian ponzi scheme

Bitcoin’s rise in African markets is driven by an old Russian ponzi scheme

FinTech, Security, What's Hot
“Welcome to the System! Together we will change the world!” These are the words I found scrawled at the bottom of a web page, right next to a picture of Sergei Mavrodi, a convicted Russian fraudster infamous for operating Mavrodi Mundial Moneybox (or MMM), one of the world’s largest ponzi schemes. Two decades after MMM was shut down, the organization reemerged under new branding, as a technology-driven “financial mutual-aid network” that uses Bitcoin to provide its members up to 100% returns on their contributions. If MMM’s participation numbers are to be believed—they claim to have over 200 million participants—they may be one of the biggest drivers of Bitcoin adoption in the world today, especially in low-income areas. Bitcoin may not be an unalloyed good for the developing world.
Cyber Security Ministry meant to enhance national security

Cyber Security Ministry meant to enhance national security

Breaking News, Security, What's Hot
Security, Threat Detection and Mitigation — sparking widespread debate among the country’s netizens (internet users) most of whom were fascinated by the new ministry. There was frenzied debate on social media, with focus trained on the possible mandate of the new ministry but the general consensus was that Government was trying to muzzle citizens’ freedom to use the internet as they see fit. Clearly, there was a need for clarity on the role of the new ministry and the Government obliged by explaining the mandate of Cde Chinamasa’s new assignment. Speaking to journalists at State House on Tuesday where some of the new ministers were being sworn in by President Mugabe, presidential Press secretary Cde George Charamba said the Ministry of Cyber Security, Threat Detection and Mitigation was
Shifting the national mindset: Sustainable development through ICT

Shifting the national mindset: Sustainable development through ICT

Gizmos, News, Security, Start Ups, What's Hot
It is often said that individuals build families, families make up society and societies build a nation. However, when addressing issues of social transformation, it is evident that the nation, represented by structures, has greater influence on the generality of the people. Policies and ideologies that are driven at national level determine how a society progresses. Zimbabwe as a nation, like any other country, is endowed with magnificent resources: minerals, fertile lands, wildlife, climate, and chief among the resources is human capital. However, tracking global developments, it is evident that development is now technologically driven through automation, digitisation of everything, artificial intelligence, robotics and many other shifts in the global economy. Our great nation ought ...
‘All wifi networks’ are vulnerable to hacking, security expert discovers

‘All wifi networks’ are vulnerable to hacking, security expert discovers

Entertainment, Gizmos, Security
The security protocol used to protect the vast majority of wifi connections has been broken, potentially exposing wireless internet traffic to malicious eavesdroppers and attacks, according to the researcher who discovered the weakness. Mathy Vanhoef, a security expert at Belgian university KU Leuven, discovered the weakness in the wireless security protocol WPA2, and published details of the flaw on Monday morning. “Attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted,” Vanhoef’s report said. “This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos and so on. Vanhoef emphasised that “the attack works against all modern protected wifi networks. Depending
Thieves steal BMW using Dark Web tech to bypass security system

Thieves steal BMW using Dark Web tech to bypass security system

Breaking News, Gizmos, News, Security
Shocking footage shows how easily thieves made off with a BMW from a driveway, using technology from the dark web. CCTV captures two men arrive with a gadget which can pick up and amplify the signal from the actual key fob. One of them holds it close to the front door and windows, trying to pick up where the key is being stored. It picks up the signal and transmits it to a gadget held by the other thief, which unlocks the car. In less than 60 seconds of the video, the key is activated and the security system of the car is bypassed. This theft is one of four to take place in north London recently, MailOnline reports. Thieves steal £50,000 BMW in under a minute Play Video Loaded: 0% 0:00Progress: 0% PlayMute Current Time 0:00 / Duration Time 0:00 Fullscreen They then drove off with
Facebook is said to seek staff with national security clearance

Facebook is said to seek staff with national security clearance

Jobs, News, Security, Social Media
Facebook Inc is looking to hire people who have national security clearances, a move the company thinks is necessary to prevent foreign powers from manipulating future elections through its social network, according to a person familiar with the matter. Workers with such clearances can access information classified by the US government. Facebook plans to use these people – and their ability to receive government information about potential threats – in the company’s attempt to search more proactively for questionable social media campaigns ahead of elections, according to the person, who asked not to be identified because the information is sensitive. A Facebook spokesman declined to comment. Job candidates with such clearances are often former government and intelligence officials o
Millions of high-security crypto keys crippled by newly discovered flaw

Millions of high-security crypto keys crippled by newly discovered flaw

Entertainment, Gizmos, Security
Factorization weakness lets attackers impersonate key holders and decrypt their data. Enlarge / 750,000 Estonian cards that look like this use a 2048-bit RSA key that can be factored in a matter of days. Steve Jurvetson 37 A crippling flaw in a widely used code library has fatally undermined the security of millions of encryption keys used in some of the highest-stakes settings, including national identity cards, software- and application-signing, and trusted platform modules protecting government and corporate computers. The weakness allows attackers to calculate the private portion of any vulnerable key using nothing more than the corresponding public portion. Hackers can then use the private key to impersonate key owners, decrypt sensitive data, sneak malicious code into digita...
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.