ICTVILLE

admin

This user hasn't shared any profile information

KENIC Lowers .KE Domain Costs to Just Ksh 650

By admin | OnWednesday, December 31st, 2014 - No Comments »
The Kenya Network Information Centre (KENIC)

The Kenya Network Information Centre (KENIC) The Kenya Network Information Centre (KENIC) has adjusted domain prices following deliberations made by the cTLD manager and registrars on 31st October 2014. TESPOK also attended the meeting. The Kenya Network Information Centre, Kenya’s .ke registrar, said that the new prices will be effective as of 1st January 2015. The adjusted domain wholesale prices are as follows:- Domain registrations: KES. 650/= Domain renewal: KES. 580/= Recommended Retail. 

Hacker Clones German Defense Minister’s Fingerprint Using Just her Photos

By admin | OnWednesday, December 31st, 2014 - No Comments »
Mr Krissler provided details of his technique at a convention in Hamburg

Mr Krissler provided details of his technique at a convention in Hamburg A member of the Chaos Computer Club (CCC) hacker network claims to have cloned a thumbprint of a German politician by using commercial software and images taken at a news conference. Jan Krissler says he replicated the fingerprint of defence minister Ursula von der Leyen using pictures taken with a “standard photo camera”. Mr Krissler had no physical print from Ms von der Leyen. Fingerprint biometrics are already. 

FBI Investigating Whether Companies Are Engaged in Revenge Hacking

By admin | OnTuesday, December 30th, 2014 - No Comments »
hacked companies

The hacked are itching to hack back. So say a dozen security specialists and former law-enforcement officials, who described an intensifying and largely unspoken sense of unease inside many companies after the recent breach of Sony Corp. (SNE)’s networks. U.S. officials have shown little appetite to intervene as banks, retailers, casinos, power companies and manufacturers have been targeted by foreign-based hackers. Private-sector companies doing business in the U.S. have few clear options for. 

Ex-Worker Theory Casts Doubt on North Korea as Sony Hacker

By admin | OnTuesday, December 30th, 2014 - No Comments »
north korea

At least one former employee of Sony Corp. (6758) may have helped hackers orchestrate the cyber-attack on the company’s film and TV unit, according to security researcher Norse Corp. The company narrowed the list of suspects to a group of six people, including at least one Sony veteran with the necessary technical background to carry out the attack, said Kurt Stammberger, senior vice president at Norse. The company used Sony’s leaked human-resources documents and cross-referenced the data with. 

Anonymous group warns of more Kenya cyber attacks

By admin | OnSaturday, July 26th, 2014 - No Comments »
Anonymous group

The ongoing cyber-attacks on web and social sites operated by the government, the military and top leaders is part of an effort to expose corruption in Kenya, a ‘hacktivist’ group has claimed. A member of hacker group Anonymous on Friday told Radio France International (RFI) that they infiltrated Twitter accounts belonging to Kenya Defence Forces and defaced several government websites after unnamed anti-corruption crusaders ‘cried for help’. In its latest attack, the cell Anon_0x03. 

Beware Keyloggers at Hotel Business Centers

By admin | OnTuesday, July 22nd, 2014 - No Comments »
A DHS/Secret Service advisory dated July 10, 2014.

A DHS/Secret Service advisory dated July 10, 2014. The U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers, warning that crooks have been compromising hotel business center PCs with keystroke-logging malware in a bid to steal personal and financial data from guests. In a non-public advisory distributed to companies in the hospitality industry on July 10, the Secret Service and theDepartment of Homeland Security’s. 

Kenya Police hunt down KDF Twitter account hackers

By admin | OnTuesday, July 22nd, 2014 - No Comments »
123

An official at the military headquarters has told Capital FM News that they are working closely with the police to apprehend those behind the hacking of the Kenya Defence Forces Twitter account @kdfinfo. He said they believe the hackers are, “tech-savvy locals,” and not outsiders given the content of their tweets. He said they have also reported the hacking and, “escalating insults,” to Twitter administrators in their bid to regain control of the account. Major Emmanuel Chirchir, the Military. 

KDF ‘liberates’ its hacked Twitter account

By admin | OnMonday, July 21st, 2014 - No Comments »

The Kenya Defence Forces (KDF) Twitter account which had been under attack from hackers has been restored after more than 12hours. KDF’s Liaison Officer Major Emmanuel Chirchir whose account was also hacked, says they have managed to recapture the KDF and his Twitter accounts from the hackers. In a tweet on his now liberated account Chirchir says they had the digital arm of the Presidential Strategic Communications Unit to thank for the restoration. Chirchir has also removed the tweets the hackers. 

Data Breach Bulletin: Anonymous Targets Kenyan Defense Forces Twitter Account

By admin | OnMonday, July 21st, 2014 - No Comments »
A screenshot of a tweet posted Monday morning on the @kdfinfo Twitter account, which has since been deleted.

A screenshot of a tweet posted Monday morning on the @kdfinfo Twitter account, which has since been deleted. This week’s data breach roundup has an international focus, with a Russian hacker group and breaches in Kenya, Australia, and the UK.  While most of the breaches reported this week occurred recently, one breach wasn’t reported for three whole years. Read on for more details: Kenya Defense Forces Twitter – On Sunday, the hacktivist group Anonymous announced that it had hacked the. 

Yahoo Ad Network abused to redirect users to malicious websites serving Magnitude Exploit Kit

By admin | OnFriday, June 20th, 2014 - No Comments »
Yahoo-Bing-Contextual-Ad-Network

Internet advertisement networks provide hackers with an effective venue for targeting wide range computers through malicious advertisements. Previously it was reported by some security researchers that Yahoo’s online advertising Network is one of the top ad networks were being abused to spread malware by cyber criminals. Recent report published by Fox-IT, Hackers are using Yahoo’s advertising servers to distribute malware to hundreds of thousands of users since late last month. 

Chinese Android Smartphone comes with Pre-installed Spyware

By admin | OnThursday, June 19th, 2014 - No Comments »
chinese-malware-android

If US has banned its several major government departments, including NASA, Justice and Commerce Departments, from purchasing Chinese products and computer technology due to suspected backdoors, then they are not wrong at all. A popular Chinese Android Smartphone comes pre-installed with a Trojan that could allow manufacturer to spy onto their users’ comprising their personal data and conversations without any restrictions and users knowledge. GOOGLE PLAY STORE OR A SPYING APP? According to. 

France World Cup team training session snooped on by a “spy drone”

By admin | OnThursday, June 19th, 2014 - No Comments »
The tweet translates to: "A drone flies over the Blues during training," referring to a colloquial name for the French soccer team. It also alludes to an investigation.

The tweet translates to: “A drone flies over the Blues during training,” referring to a colloquial name for the French soccer team. It also alludes to an investigation. Scandal has already taken hold of the World Cup on the tournament’s first day of matches. After spotting a drone hovering over its practice yesterday, France’s team manager Didier Deschamps has called for an investigation into the possibility that the team was spied on, according to Yahoo Sports. Deschamps told. 

BEWARE: Cryptowall Ransomware Spreading through Malicious Advertisements

By admin | OnThursday, June 19th, 2014 - No Comments »
cryptowall-thmb

What’s next for ransomware? Cryptowall picks up where CryptoLocker left off When an international law enforcement action earlier this month knocked out the Gameover botnet, one happy consequence was the takedown of the servers that the CryptoLocker ransomware needed in order to do its dirty work. Well, any celebration over CryptoLocker’s demise is certainly premature - encrypting ransomware is alive and well. With many victims paying up, ransomware is a lucrative business for the. 

[VIDEO] Kenya now says US tapping Uhuru’s phone calls

By admin | OnFriday, May 30th, 2014 - No Comments »
ruto

The government has started investigations against the United States after allegations that its intelligence agency has been secretly listening to phone conversations of President Uhuru Kenyatta and senior State House officials. ICT Cabinet Secretary Fred Matiang’i said the government will dig into the matter, adding that they were not ready to tolerate the snooping, which has faced other world leaders. “This is plainly put, very bad manners. This is intrusive, it abuses the privacy of our President. 

[VIDEO] How to remove your personal search results from Google

By admin | OnFriday, May 30th, 2014 - No Comments »
google2

Two weeks ago, Europe’s highest court ruled that E.U. citizens have “the right to be forgotten” — in other, less poetic words, the right to request that search engines like Google remove unflattering or defamatory search results at an individual’s request. The ruling was a bit of a shock, particularly for the search engine industry, now handed the unsavory (and unwieldy) logistical task of evaluating and processing an untold number of requests. On Friday, Google revealed how it plans. 

PLACE AD HERE


Tags