523 views

Ex-Worker Theory Casts Doubt on North Korea as Sony Hacker

By admin | On Tue, Dec 30th, 2014 - No Comments »
north korea

At least one former employee of Sony Corp. (6758) may have helped hackers orchestrate the cyber-attack on the company’s film and TV unit, according to security researcher Norse Corp. The company narrowed the list of suspects to a group of six people, including at least one Sony veteran with the necessary technical background to carry out the attack, said Kurt Stammberger, senior vice president. 

1,312 views

Anonymous group warns of more Kenya cyber attacks

By admin | On Sat, Jul 26th, 2014 - No Comments »
Anonymous group

The ongoing cyber-attacks on web and social sites operated by the government, the military and top leaders is part of an effort to expose corruption in Kenya, a ‘hacktivist’ group has claimed. A member of hacker group Anonymous on Friday told Radio France International (RFI) that they infiltrated Twitter accounts belonging to Kenya Defence Forces and defaced several government. 

915 views

Beware Keyloggers at Hotel Business Centers

By admin | On Tue, Jul 22nd, 2014 - No Comments »
A DHS/Secret Service advisory dated July 10, 2014.

A DHS/Secret Service advisory dated July 10, 2014. The U.S. Secret Service is advising the hospitality industry to inspect computers made available to guests in hotel business centers, warning that crooks have been compromising hotel business center PCs with keystroke-logging malware in a bid to steal personal and financial data from guests. In a non-public advisory distributed to companies. 

1,011 views

Kenya Police hunt down KDF Twitter account hackers

By admin | On Tue, Jul 22nd, 2014 - No Comments »
123

An official at the military headquarters has told Capital FM News that they are working closely with the police to apprehend those behind the hacking of the Kenya Defence Forces Twitter account @kdfinfo. He said they believe the hackers are, “tech-savvy locals,” and not outsiders given the content of their tweets. He said they have also reported the hacking and, “escalating insults,”. 

1,142 views

KDF ‘liberates’ its hacked Twitter account

By admin | On Mon, Jul 21st, 2014 - No Comments »

The Kenya Defence Forces (KDF) Twitter account which had been under attack from hackers has been restored after more than 12hours. KDF’s Liaison Officer Major Emmanuel Chirchir whose account was also hacked, says they have managed to recapture the KDF and his Twitter accounts from the hackers. In a tweet on his now liberated account Chirchir says they had the digital arm of the Presidential. 

1,204 views

Data Breach Bulletin: Anonymous Targets Kenyan Defense Forces Twitter Account

By admin | On Mon, Jul 21st, 2014 - No Comments »
A screenshot of a tweet posted Monday morning on the @kdfinfo Twitter account, which has since been deleted.

A screenshot of a tweet posted Monday morning on the @kdfinfo Twitter account, which has since been deleted. This week’s data breach roundup has an international focus, with a Russian hacker group and breaches in Kenya, Australia, and the UK.  While most of the breaches reported this week occurred recently, one breach wasn’t reported for three whole years. Read on for more details: Kenya. 

1,170 views

Yahoo Ad Network abused to redirect users to malicious websites serving Magnitude Exploit Kit

By admin | On Fri, Jun 20th, 2014 - No Comments »
Yahoo-Bing-Contextual-Ad-Network

Internet advertisement networks provide hackers with an effective venue for targeting wide range computers through malicious advertisements. Previously it was reported by some security researchers that Yahoo’s online advertising Network is one of the top ad networks were being abused to spread malware by cyber criminals. Recent report published by Fox-IT, Hackers are using Yahoo’s. 

1,246 views

Chinese Android Smartphone comes with Pre-installed Spyware

By admin | On Thu, Jun 19th, 2014 - No Comments »
chinese-malware-android

If US has banned its several major government departments, including NASA, Justice and Commerce Departments, from purchasing Chinese products and computer technology due to suspected backdoors, then they are not wrong at all. A popular Chinese Android Smartphone comes pre-installed with a Trojan that could allow manufacturer to spy onto their users’ comprising their personal data and. 

1,123 views

France World Cup team training session snooped on by a “spy drone”

By admin | On Thu, Jun 19th, 2014 - No Comments »
The tweet translates to: "A drone flies over the Blues during training," referring to a colloquial name for the French soccer team. It also alludes to an investigation.

The tweet translates to: “A drone flies over the Blues during training,” referring to a colloquial name for the French soccer team. It also alludes to an investigation. Scandal has already taken hold of the World Cup on the tournament’s first day of matches. After spotting a drone hovering over its practice yesterday, France’s team manager Didier Deschamps has called. 

1,562 views

BEWARE: Cryptowall Ransomware Spreading through Malicious Advertisements

By admin | On Thu, Jun 19th, 2014 - No Comments »
cryptowall-thmb

What’s next for ransomware? Cryptowall picks up where CryptoLocker left off When an international law enforcement action earlier this month knocked out the Gameover botnet, one happy consequence was the takedown of the servers that the CryptoLocker ransomware needed in order to do its dirty work. Well, any celebration over CryptoLocker’s demise is certainly premature - encrypting. 

790 views

[VIDEO] Kenya now says US tapping Uhuru’s phone calls

By admin | On Fri, May 30th, 2014 - No Comments »
ruto

The government has started investigations against the United States after allegations that its intelligence agency has been secretly listening to phone conversations of President Uhuru Kenyatta and senior State House officials. ICT Cabinet Secretary Fred Matiang’i said the government will dig into the matter, adding that they were not ready to tolerate the snooping, which has faced other. 

1,209 views

[VIDEO] How to remove your personal search results from Google

By admin | On Fri, May 30th, 2014 - No Comments »
google2

Two weeks ago, Europe’s highest court ruled that E.U. citizens have “the right to be forgotten” — in other, less poetic words, the right to request that search engines like Google remove unflattering or defamatory search results at an individual’s request. The ruling was a bit of a shock, particularly for the search engine industry, now handed the unsavory (and unwieldy) logistical. 

1,577 views

Sesube : Yunasi Band Ft Rabbit New Video

By admin | On Thu, May 1st, 2014 - No Comments »
yunasi

After a long silence, popular Afro-fusion group Yunasi is back with a new song. Titled Sesube Dance, the song features rapper Rabbit, with the video being shot in Huruma and Mathare estates where the members of the group started their music careers over a decade ago. Yunasi was among the Kenyan boy bands that took Kenyan music to Europe and Asia in the mid-2000s. They later broke up to. 

3,047 views

KQ SACKS its PR Manager And Former Citizen TV Host for Lying About Her Educatio

By admin | On Thu, May 1st, 2014 - No Comments »
ALICE+ODERA

We once tweeted that Alice Odera who was then a TV host at Citizen TV never went to New York University or any other university nor did all those things she claimed that she did. She was a fraud who Royal Media HR couldn’t do due diligence on. Well, KQ has today discovered that Alice Odera was a stripper in New York and was deported from USA after the authorities discovered some ugly. 

2,807 views

Two JKUAT Students behind the new biometric land registration system

By admin | On Thu, May 1st, 2014 - No Comments »
Robert Ouko and Jennifer Mwai,

Robert Ouko and Jennifer Mwai, Land ownership remains a sticky issue in our country and record management seems to be one of the core problems. There are many instances where several people have title deeds for the same parcel of land. This issue led two innovative minds from Jomo Kenyatta University of Agriculture and Technology (JKUAT) to seek solutions in technology and the result has.