Ransomware a rampant force in local companies according to ProComm and Check Point Software Technologies
Cyber security is a very hot topic the world over and has been a cause of concern the world over with companies big and small falling victim to a malicious attack known as RansomWare. A local Cybersecurity firm, ProComm Group, says Zimbabwean companies have been the victim of RansomWare on numerous occasions. Some companies have […]
Nothing can be further from the truth. The internet does not give you anonymity unless you diligently seek it and even then just one breadcrumb is all it takes for you to be unmasked and get into real trouble.
When you delete your files the regular way in Windows and Linux they are not really gone and if someone came along soon enough they can recover them. Even the rm -rf command does not really delete files. When you “delete” the file the file deleting utility simply makes the file invisible and marks that part of the operating system as available.
The sad truth is that unless you have consciously taken the effort to secure your computer, a Linux distro less than 200 MB and basic command line skills is all it takes to defeat your long complex password.
After assuming responsibility for the attack and explaining how it managed to execute it (it’s been described as a DNS Reflection attack), Anonymous Africa has also promised to continue with its work and has mentioned some potential targets which include Zimbabwe’s ruling party ZANU PF.
Viber the Instant messaging platform and VoIP service that most of us have forsaken for WhatsApp recently announced complete end-to-end encryption (E2EE) across all devices including Android and iOS devices as well as PC and Mac desktops.
WhatsApp has announced that it is enabling end-to-end encryption for all of its users on the latest version of the application.
A report yesterday in the government owned newspapers The Sunday Mail, says the president of Zimbabwe, Robert Mugabe, is intent on introducing Chinese style internet restrictions to the country to put a stop the “abuse” of the internet. According to the article, the president was addressing his party supporters at Harare International Airport who had come to welcome […]
Hammer n Tongues, arguably Zimbabwe’s largest e-Commerce company, yesterday morning accidentally sent out private contact details of over 5,000 customers in an email to their customer base. The details included name, email address, phone number and the city of the customers. The details also included a customer buyer ID that the company uses on their ecommerce platform. The information, which was in […]
I promised the guys here at Techzim that I would be sharing a few things that can help us improve our ecosystem. So I am hopeful that over the course of this year, time permitting, I will be sharing a few tech bites from my experience as a software engineer and entrepreneur. Many of you have […]
Econet’s classifieds website, Ownai, is down again. It’s not clear yet if it’s another case of lots of visitors trying to visit the site at once (they just sent out an SMS ad inviting user to the platform) or if it’s the case of hackers having hit it again.
You can avoid becoming a victim of most of these breaches by making use of multi-factor authentication. Multifactor authentication (MFA) is a security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity for a login or other transaction.
According to Econet, the Ownai site is still undergoing some necessary tests around security and stability and the inference that had been made that it was hacked wasn’t necessarily factual.
Ownai, the new version of Tengai wasn’t accessible for an extended interval, with visitors to the URL ownai.co.zw being directed to a page carrying a 504 Gateway Timeout error message. Usually, this is diagnosed as a network error between servers, but because of the history that Tengai had with security breaches, some people have opined that this could have been another attack.
Here’s a quick guide on how to encrypt files using PGP on Windows.
This is an introduction into the world of encryption which touches on the basics of the subject. The topic is becoming increasingly relevant in a world where a lot of our data is shared on cloud networks.
The local press recently carried the story of Brighton Berejena, a Zimbabwean ICT professional who acted unethically by accessing his former employer’s internet service, disabled five servers and changed some of the passwords. As the former IT administrator for a company called Kreamorn Investment, he had all the necessary intelligence to access the company’s system […]
Some people might recognise the name Owasp, a global non-profit organisation that works on improving software security. The Owasp Bulawayo chapter, in partnership with tech incubator, SkyHub, will be holding an event called “How To Hack a Bank Using XSS”.
Zimbabwean websites (.co.zw TLD) are easy pickings for hacker groups making names for themselves – that is the impression I get looking at the sheer number of defaced websites. The state of local website security is appalling. After my research, the most worrying thing I found is how long some websites stay defaced, it’s almost as if […]