Saturday, January 19Always On-point

Security

South Africa hacked: about 30 million ID numbers leaked

South Africa hacked: about 30 million ID numbers leaked

Security
Just after we introduce a Ministry of Cyber Security, Threat Detection and Mitigation,our neighbour South Africa gets what seems to be its largest data breach in history; what are the odds? If I didn’t know any better I’d say it’s the Zim government trying to prove a point but well… A few days ago, about 30-million identity numbers and other personal such as personal income, age, employment history, company directorships, race group, marital status, occupation, employer, previous addresses as well as financial information was hacked and then leaked on the internet. That’s massive! I mean the whole Zimbabwean population amounts to 16 million (lets work with that), that’s like half the number of people whose privacy has been breached in South Africa. In f
Silicon Valley Fund Invests In South African Mobile Security Firm

Silicon Valley Fund Invests In South African Mobile Security Firm

Security
Silicon Valley-based investment firm Endeavor Catalyst has backed South African authentication and app security company Entersekt through a funding round that was realized in September. The successful funding round was a first for Endeavor Catalyst in South Africa, according to BusinessTech. The South African mobile security solutions firm is led by entrepreneurs Schalk and Dewald Nolte. They develop push-based authentication and app security technology to protect clients in several industries, including banking. Entersekt’s products include a platform called Transakt, which enables a one-touch user experience. Entersekt’s clients include First Bank of Colorado, Absa, Nedbank, Capitec, Investec, Swisscard, Equity Bank, Ecobank, and Pluscard, according to TechCentral.
Conservancy Rangers Turn To Tech To Save Africa’s Wildlife

Conservancy Rangers Turn To Tech To Save Africa’s Wildlife

News, Security
 Josephine Ekiru is not nostalgic for the past. Growing up in northern Kenya in an impoverished home, she was surrounded by violence and loss. People regularly killed the wildlife she loved, and they killed each other. Tribal clashes stoked by resource scarcity and decades-long vendettas were the norm.   “The only thing I was seeing was death,” Ekiru recalls. “I grew up thinking, ‘One day, I’ll tell my people that conflict is not good, that it only takes us in a circle of poverty.’” Luckily in 2011, when Ekiru was 24 years old, she discovered the Northern Rangelands Trust (NRT), an organization composed of community conservancies in Kenya. Those animal conservancies reject violence in favor of peace, sustainability and responsible, shared management of land and wildlife. R
Nearly half of U.S. teens prefer Snapchat over other social media

Nearly half of U.S. teens prefer Snapchat over other social media

Security, Social Media, What's Hot
Snapchat is more popular among U.S. teens than ever, according to new research from investment firm Piper Jaffray. The company surveys teens in the U.S. about their media habits every spring and fall. This fall’s survey found that 47 percent of surveyed teens say Snapchat is their preferred social media, up from 39 percent in the spring. Way back in the spring of 2015, Snapchat was their least preferred social media platform. And Instagram hasn’t been the most popular platform since 2015, according to the survey data. Recently Snapchat has seen increased pressure from Instagram, which, along with parent Facebook, has been copying Snapchat’s features. The move has been paying off as Instagram has eaten away at Snapchat’s share of new users in the U.S., according to data from Adobe.--r
Social media South Africa 2018, are we ready?

Social media South Africa 2018, are we ready?

Media, Security, Social Media, What's Hot
I recently attended Arthur Goldstuck's presentation on the SA Social Media Landscape 2018. From research conducted by World Wide Worx and Ornico, 118 of South Africa's largest businesses shared information on their social media, digital strategy and future plans. What stood out for me was the potential for brands on YouTube. Plus a bigger question, are some businesses still not prepared for social media integration? For someone in the industry it was heartening to see the positive growth statistics of social media in South Africa over the last year. What’s gone up? Facebook is now used by 97% of big business, a rise from 91% in 2016, Instagram from 62% to 71.6% and LinkedIn from 63% to 71.6%. Corporate blogs grew from 24% to 36% this year and we can look forward to 8% more businesses ad
Bitcoin’s rise in African markets is driven by an old Russian ponzi scheme

Bitcoin’s rise in African markets is driven by an old Russian ponzi scheme

FinTech, Security, What's Hot
“Welcome to the System! Together we will change the world!” These are the words I found scrawled at the bottom of a web page, right next to a picture of Sergei Mavrodi, a convicted Russian fraudster infamous for operating Mavrodi Mundial Moneybox (or MMM), one of the world’s largest ponzi schemes. Two decades after MMM was shut down, the organization reemerged under new branding, as a technology-driven “financial mutual-aid network” that uses Bitcoin to provide its members up to 100% returns on their contributions. If MMM’s participation numbers are to be believed—they claim to have over 200 million participants—they may be one of the biggest drivers of Bitcoin adoption in the world today, especially in low-income areas. Bitcoin may not be an unalloyed good for the developing world.
Cyber Security Ministry meant to enhance national security

Cyber Security Ministry meant to enhance national security

Breaking News, Security, What's Hot
Security, Threat Detection and Mitigation — sparking widespread debate among the country’s netizens (internet users) most of whom were fascinated by the new ministry. There was frenzied debate on social media, with focus trained on the possible mandate of the new ministry but the general consensus was that Government was trying to muzzle citizens’ freedom to use the internet as they see fit. Clearly, there was a need for clarity on the role of the new ministry and the Government obliged by explaining the mandate of Cde Chinamasa’s new assignment. Speaking to journalists at State House on Tuesday where some of the new ministers were being sworn in by President Mugabe, presidential Press secretary Cde George Charamba said the Ministry of Cyber Security, Threat Detection and Mitigation was
Shifting the national mindset: Sustainable development through ICT

Shifting the national mindset: Sustainable development through ICT

Gizmos, News, Security, Start Ups, What's Hot
It is often said that individuals build families, families make up society and societies build a nation. However, when addressing issues of social transformation, it is evident that the nation, represented by structures, has greater influence on the generality of the people. Policies and ideologies that are driven at national level determine how a society progresses. Zimbabwe as a nation, like any other country, is endowed with magnificent resources: minerals, fertile lands, wildlife, climate, and chief among the resources is human capital. However, tracking global developments, it is evident that development is now technologically driven through automation, digitisation of everything, artificial intelligence, robotics and many other shifts in the global economy. Our great nation ought ...
‘All wifi networks’ are vulnerable to hacking, security expert discovers

‘All wifi networks’ are vulnerable to hacking, security expert discovers

Entertainment, Gizmos, Security
The security protocol used to protect the vast majority of wifi connections has been broken, potentially exposing wireless internet traffic to malicious eavesdroppers and attacks, according to the researcher who discovered the weakness. Mathy Vanhoef, a security expert at Belgian university KU Leuven, discovered the weakness in the wireless security protocol WPA2, and published details of the flaw on Monday morning. “Attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted,” Vanhoef’s report said. “This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos and so on. Vanhoef emphasised that “the attack works against all modern protected wifi networks. Depending
Thieves steal BMW using Dark Web tech to bypass security system

Thieves steal BMW using Dark Web tech to bypass security system

Breaking News, Gizmos, News, Security
Shocking footage shows how easily thieves made off with a BMW from a driveway, using technology from the dark web. CCTV captures two men arrive with a gadget which can pick up and amplify the signal from the actual key fob. One of them holds it close to the front door and windows, trying to pick up where the key is being stored. It picks up the signal and transmits it to a gadget held by the other thief, which unlocks the car. In less than 60 seconds of the video, the key is activated and the security system of the car is bypassed. This theft is one of four to take place in north London recently, MailOnline reports. Thieves steal £50,000 BMW in under a minute Play Video Loaded: 0% 0:00Progress: 0% PlayMute Current Time 0:00 / Duration Time 0:00 Fullscreen They then drove off with
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.