Wednesday, October 16, 2024

Tech News, analysis, updates, comments, reviews

The Tor Project + Tails, A Game-Changing Merger...

In a significant development for digital privacy enthusiasts, the Tor Project and Tails have merged their operations, uniting two of the most trusted tools in the fight against online surveillance. This merger, announced this month, combines the power of Tor’s anonymity network with Tails' privacy-focused portable operating system. The goal? To offer a more robust, comprehensive solution for users seeking to protect their digital activities from prying eyes. Why This Merger Matters Tor and Tails have long been go-to tools for activists, journalists, and individuals under oppressive regimes, and privacy sensitive persons. Tor, best known for its anonymizing browser, routes users’ internet traffic through multiple servers to mask their...

Concerns about the ICT Bill 2024 in Kenya

Kenya's tech industry has been a beacon of innovation and growth, thanks in part to a regulatory environment that has allowed startups and innovators to thrive. However, the proposed ICT Bill 2024 raises concerns about the future of this sector. The current regulatory framework, while not perfect, has enabled significant job creation and economic development. It has encouraged a innovative culture of entrepreneurship where new ideas can flourish without unnecessary barriers, in an economy that is growing and adapting quickly. Remember Kenya is a third world country. The ICT Bill 2024, if passed in its current form, introduces stricter regulations that could completely kill innovation. For example, the...

Enjoy exclusive access to our content

Get an online subscription and you can unlock any article you come across, getting instant emails when our site updates, too.

Latest hack to test Biden’s vow for consequences for Russia

WASHINGTON (AP) — President Joe Biden said he would “deliver” a message to Russian President Vladimir Putin about the latest ransomware attacks targeting American...

Continued Use of Python 2 Will Heighten Security Risks

Nearly five months after the Python Software Foundation finally ended support for the Python 2 programming language, many developers are continuing to use it, heightening security risks for their organizations in the process. Support for Python 2 ended Jan. 1,...

Why I chose Laravel and stuck to it

Laravel framework is known for its elegant syntax which is easy to learn, and enjoyable to work with. With Laravel, you get to work on your projects quickly. You can also save a lot of time, and work with access to functions such as user authentication, section management, and caching.

Regulation Insights from Starlink’s in Zimbabwe

In recent times, the journey of Starlink, Elon Musk's ambitious satellite internet venture under SpaceX, has been marked by regulatory challenges, particularly in Zimbabwe....

Why Organizations Refuse to Prioritize Cybersecurity Despite Increasing Threats

Recently, cybersecurity breaches and attacks have become increasingly common and sophisticated, posing a significant risk to organizations of all sizes and industries. These range from high-profile data breaches at major corporations to ransomware attacks on critical infrastructure. The consequences...

The state of Cyber Security in Kenya

The regulatory authority responsible for ICT, and specifically CyberSec in Kenya is the Communication Authority (CA) of Kenya. It was founded in 1999. It's the body mandated with developing our cyber security management framework. Kenya's national point of contact on...

Enjoy exclusive access to our content

Get an online subscription and you can unlock any article you come across, getting instant emails when our site updates, too.

Worldwide news every day

Leave a minimal digital footprint

Your digital footprint paints a picture of who you are. Every day, whether we want to or not, most of us contribute to a growing...

How Kenyans (and the world) are falling for a Bitcoin Scam

Bitcoin scams seem to gain track in Kenya and globally overall. Here, Blancos explains how these scams operate, and how to really identify...

Ransomware: Now and The Future

Ransomware has staked its claim as a major element of the cybercriminal ecosystem. As one of the most potentially damaging and costly types of...

Attack Lifecycle story – part 1

I was recently explaining to a group of colleagues how a hacker gains access to a system. Then it hit me; most people are...

Read more

Get involved

Unveiled: How xHelper Android Malware Re-Installs Even After Factory Reset

xHelper- A mysterious piece of Android malware that re-installs itself on infected devices even after users delete it or factory reset their devices—making it nearly impossible to remove. xHelper reportedly infected over 45,000 devices last year, and since then, cybersecurity researchers have been trying to unfold how the malware survives factory reset [...]

Become part of the community

On-Premises vs. Cloud Security

As usual, we begin by championing cybersecurity. It stands as the foremost concern for organizations striving to safeguard their sensitive data and digital assets. Among the many strategies available, two dominant paradigms have emerged: on-premises security and cloud security....

Amazon took data from its own sellers to develop competing products

Amazon.com Inc. AMZN, +1.64% employees have used data about independent sellers on the company’s platform to develop competing products, a practice at odds with the company’s stated policies. The online retailing giant has long asserted, including to Congress, that when it makes and sells its own products, it doesn’t use information it collects from the [...]

Information Security in the Time of Covid-19 – Moving to the Cloud as a Cost-Cutting Measure Does Not Lessen Compliance Obligations

Recurringly, organizations fail to ask themselves the most rudimentary questions before moving to cloud platforms, and they suffer as a result...

Microsoft: Here’s how we’re trying to manage increased cloud demand

Microsoft prioritized the needs of first responders, healthcare workers, and others on the front line, as they've noted previously. And they've throttled some less-essential services to try to keep things humming. On April 23, officials...
spot_img

Create a website from scratch

With our Website Development Service you can be up and running in no time and get yourself or your business visible to millions of potential clients online!

WhatsApp extends deadline for new privacy policy after people fled

WhatsApp on Friday announced that it will be extending the deadline of its confusing policy implementation by three months. The widely criticised policy required that its two billion users must either accept its updated terms and conditions by February...

How to Effectively Detect and Respond to a Data Breach

Prevention is key, so be sure to take steps to prevent breaches from occurring in the first place by implementing strong security measures and regularly monitoring your systems for potential threats

How Kenya’s new personal data protection law could affect researchers

The risk of infringing on privacy is growing by the day given the increased frequency and granularity of the data being collected, and advances in the technology for processing them. This has, inevitably, led to the need for laws to secure personal data privacy. Researchers and research data are not exempt: advances in big data [...]

Leave a minimal digital footprint

Your digital footprint paints a picture of who you are. Every day, whether we want to or not, most of us contribute to a growing portrait of who we are online; a portrait that is probably more public than we...

A Rant: Stripping Privacy in This Era

The world has a privacy problem. Everything connected to the Internet (which is almost everything today), is for the taking. Looking around an average person's daily routine, it exposes the enlarging attack surface with each device we purchase, each...

Court Explains About Claim To Let Government Listen To Citizens’ Phones

The Judiciary came out to disprove a news report by Standard carried on the daily's Sunday edition that claimed that in a ruling by the Court of Appeal, the government had been given the go-ahead to tap and listen to private calls

Australia: Unprecedented surveillance bill rushed through parliament in 24 hours.

Australian police can now hack your device, collect or delete your data, take over your social media accounts - all without a judge's warrant. The Australian government has been moving towards a surveillance state for some years already. Now they are putting the nail in the coffin with an unprecedented surveillance bill that allows the [...]
spot_img

Create a website from scratch

With our Website Development Service you can be up and running in no time and get yourself or your business visible to millions of potential clients online!

Amazon is finally getting serious about crypto and hopes to bring it to customers ‘as soon as possible,’ as it looks to hire a...

Amazon is finally getting serious about crypto technologies like bitcoin, a move that pushes the e-commerce giant into the burgeoning yet wildly volatile digital-currency space.

Cryptojackers and hackers

What qualifies as nightmare news for many cryptocurrency owners—prices of most major tokens taking another dive into the gutter—seems to not be that big a problem for cybercriminals who hijack hardware resources to mine it on someone else’s dime. The...