Monday, February 25, 2019

NIRA is not serious

NIRA as an authority established to oversee the issuance of national identity cards has been a failure not because it doesn't know what to do but the recklessness of its workers and other bodies involved in the national id process.
It is unbecoming as to how alot of foreigners easily got and get our national id yet the valid citzens take more time with alot of inconviniences in getting the national id.when i write this,i know alot of you out there think that am simply writting,but the real issue is that the whole NIRA processes in getting National id are getting nuisance and too much inconviniencing with alot of bribery at some levels.
Its true that foreigners have been crossing border to get national ids and hiw they apply for them is through bribery.In districts close to borders,the DISOs,GISOs and the LC1s usually get bribes to sign for these foreigners,however it shoukd be noted that RDCs are not involved in this nonsensical bribery.They are allegations that in the past mass processing of the national ID,some of the foreigners would pay too much money to be given a go a head in the process and they would get them more easily and faster than the ugandan citzens.
Its absurd that many people who are sickly and bed ridden,cripples plus many without ability to reach processing centres are up to now without IDs.NIRA must with an immediate effect put up a specialized program to avail these peoople with the IDs.
There should be "edition"of information given and included on these IDs especially the address and phone numbers.Imagine some providing a phone number not registered in the names that arent corresponding with those on the IDs.
As i have talked of foreigners getting our IDs,its very dangerous for a foreigner to get our National ID.These idiots who accept such bribes cannot realise it.For example,such people may use such apparently wright identification to join the police force,national army or any sensitive office with the main purpose of carrying on espionage. I call upon the mighty Police force and Mighty UPDF to always take excessive and thorough scrutiny of some of these applicants.lf some of these idiots who take bribes are not patriotic, we are patriotic, we love our country and anyone to receive any national document must legally apply for it.
For God and my Country.

What Burundi's ambassador to Uganda said about tension with Rwanda.

Burundian Ambassador to Uganda Jean Bosco Barege has ruled out the possibility of a “direct military confrontation” with Rwanda as tension between the two countries mounts, but quickly warned Kigali risks being attacked by several armed movements in the region if the government of President kagame makes serious miscalculations.

Bad Black for questioning at CID office

Kampala socialite Shanita Namuyimbwa, popularly known as Bad Black has appeared at the Police Directorate of Criminal Investigations (CID) for questioning over a video she posted online in which she makes serious allegations about a senior government official.
She posted the video on her Facebook page seven months ago, although police have just picked interest to inquire into the claims.
Bad Black on Monday appeared at CID headquarters in Kubuli, Kampala with her lawyers Julius Galisonga and Sam Muyizzi.
CID spokesman SP Vincent Ssekatte said she was supposed to appear on Wednesday (February 27) but she decided to come today.
"We have taken her to the officers for interrogation," he said.
The Force did not say who the complainant is in the case, but the local celebrity likely breached the Computer Misuse Act, according to detectives.
Mr Joseph Obwona, the deputy CID director, in a February 20 summons ordered Ms Namuyimbwa to report to CID headquarters without fail.
“We are investigating a case of offensive communication and criminal libel. You are, therefore, in pursuance of the provisions of Section 27A of the Police Act (as amended) required to report before acting Commissioner of Police [in charge of media department] at CID headquarters…without fail,” he wrote.
In the video, she is alleged to have hurled expletives at the senior official.
Bad Black made the statement as she was protesting the continued detention of Kyadondo East Member of Parliament, Mr Robert Kyagulanyi, alias Bobi Wine, who was arrested and taken into military custody last August for allegedly stoning President Museveni’s car in Arua.
She later used social media to apologise to the adversely named official and retracted the statements.
Social media misuse charged
Police have lately intensified crackdown on social media users under the Computer Misuse Act, questioning or arresting as many as five in the past year, among them remanded former Makerere University researcher, Dr Stella Nyanzi and Mr Mulangira Hope Kaweesa, a Democratic Party supporter.
According to Section 25 of the Computer Misuse Act 2011 on offensive communication, “Any person who wilfully and repeatedly uses electronic communication to disturb or attempts to disturb the peace, quiet or right of privacy of any person with no purpose of legitimate communication whether or not a conversation ensues commits a misdemeanour and is liable on conviction to a fine not exceeding twenty four currency points or imprisonment not exceeding one year or both.”

Police's say on kyaligonza


The Police yesterday, 24/02/2019, acknowledged apologies from its Sister Security Agency, the UPDF over the manner in which our officer, Sgt Namaganda Esther was treated by its officers while on official duty.
The incident that was captured on video, started when the driver of motor vehicle reg. no. 18CDMI who was heading from Kampala – Mukono, wrongfully made a U-turn in the middle of the road at Seeta junction; and was stopped by the traffic officer. This prompted, two body guards to the Ugandan Ambassador to Burundi, Major General (rtd) Matayo Kyaligonza, to jump out of the car and angrily confront our officer, including assault after she attempted to stop them from making the U-turn.
We want to strongly condemn such acts of brutality upon our officers, and do further congratulate our officer on the degree of patience and restraint exhibited. We are observing her treatment and speedy recovery from the injuries and trauma suffered from the incident. This is one example of the risks all police officers face as they work to protect the citizens they serve.
The Police was created two task teams to pursue the matter, which include; the KMP Traffic Commander who will investigate the conduct of the driver, for inconsiderate use of the road; and another team under the CID Commander KMP to investigate the changes of assault and wilful obstruction of an officer on official duty. The team is also investigating an additional complaint of assault from a UBC Journalist, Peter Otai, who was allegedly assaulted while capturing the incident on video.
The task teams will jointly coordinate with the Chieftaincy of Military Intelligence and obtain statements from the two body guards, already in military custody namely: RA/221607 L/CPL Bushindiki Peter and RA/230927 Pte Okurut John Robert.
The public must know that the military charge against them has criminal consequences, reason why we are working with the CMI to bridge the gap and explore the opportunity of charging the suspects on both criminal charges and court martial, over the same behaviour.
As a matter of protocol, the team will through the police leadership cause for the summoning of H.E. The Ambassador Major General (rtd) Matayo Kyaligonza, through the Ministry of Internal Affairs to the Ministry of Foreign Affairs on probable charges of assault and wrongful obstruction of an officer on duty.
You will be updated progressively.
POLICE INCREASES VISIBILITY IN NAPAK DISTRICT
The Police and Sister Security Agencies are actively monitoring the security situation in Napak district, following attempts to hold violent protests, over the pronouncement of the Ministry of Local Government, Hon. Col. Tom Butime, which confirmed the boundary line, between Napak and Katakwi Districts at Iriri village.
The pronouncement on the 19 February, 2019, was made as per the findings of the independent survey conducted in 2016. The Napak Community felt disappointed over the fact that the demarcation curved out Alekilek village, which is dominated by the Karimojong and is located 3kms from the new borderline into Katakwi district.
On the 23 February, 2019, the Police dispersed a crowd of about 200 youths that had been mobilised to march in protest from Iriri in Napak district, a distance of 6 kms to Alekilek village in Katakwi district. They were stopped and dispersed after they attempted to lynch the Chairman LCV Napak, Lamonyang Joseph SONIK as well promote breach of peace in the area. There were no injuries.
The situation has since remained calm and peaceful. And we want to encourage the aggrieved party to seek redress through lawful means.
CP Enanga Fred
Police Spokesperson
25 February 2019

Sunday, February 24, 2019

WHY YOUR PHONE OVER HEATS AND DRAINS BATTERY VERY FAST

WHY YOUR PHONE OVER HEATS AND DRAINS BATTERY VERY FAST:
Faulty capacitors and resistors are the main reason for this problem.. as all electronic experts have to agree ,that capacitors do BLOCK direct current as they allow alternating current to pass,meaning that capacitors do smoothen the output from a power supply. thus when capacitors are faulty high levels of direct current will flow via the PCD thus leading to over heating! again,we know that capacitors store current ,when current flows to the metal plate via the dielectric forming an electromagnetic field where -ve and +ve electrons are absorbed and stored at the two metallic plates to be released later thus if capacitors get faulty alot of current will directly distributed and thus draining the battery fast! resistor limit flowage of current in high levels and reduce voltage to a desired level,e.g if a battery has 4 volts and a chip need 2 volts,2 resistors of equal resistance placed in a series will be needed to half the voltage to prevent heating.
Why and how do capacitors and resistors get faulty?
Its absurd that here in africa we almost get fake phones from shops,phone brands originating from china have taken over the whole of africa.Techno,airtel are soon getting up to 93% of the total number of phones held here in africa.Am not saying that most phones made in china are fake but i say "phones from china shipped to africa are all fake in one way or the other"
.1- These fake phones bought at cheap price are always made of cheap materials and involve cheap technology in their manufucture meaning that at and in any cost will always face alot of technical problems.capacitors and resistors in these phones are of poor quality and cannot hold or relay electric currents for long time that's why a chinese phone that was good at reserving battery may get worse as it get to one year in use.Weak circuit boards on which the capacitors and resistors are not firmly fixed such that when it falls down they usually get peeled off or loosely held on it.If one is not used to phones its very hard to detect such faults.Again,these phones have poorly designed circuit patterns that may lead to shortcircuits on the PCB.All these are responsible for over heating and battery drain.
2.Climate conditions and poor maintenance of phones! In africa people use phones for lighting where they put phones in the mouth and you know th torch of a phone is on top and usually its the charging system area that's directly exposed or put inside the mouth.As one exhales,its carbondioxide which foms a milk cloud and gets on the PCB and the resistors.when carbon dioxide mixes with saliva,moisture and other air components, they form weak carbonic acid that erodes the capacitors and the resistors. If you take a look inside your phone charging system or on resistors if you open it.you see bluish or greenish substances,those are oxides of the corroded metal from which the resistors are made.These corruded material bridge circuitry patterns or bridge resistor that are close and lead to short circuiting you literary call burning.You must put in mind that the resistors and capacitor that first does the regulations of current flow are near the charging system.Again,most phones when hit by rainfall andas you know that rain water is weak carbonic acid and highl corrusive as explained above, is also another cause of faulty capacitors and resistors.
3.Poor charging mentality and poor chargers: Phones have a limited time over which they must spend on charge.when its new,you owe to charge it for atleat 16 hours to make the circuit board used to electric current.How many do that here in africa.Some people have to leave phones to charger from evening up to morning.its even not allowed not to recieve call when charging or one should put the phone off when charging.The activities on phone use current and if we use it when its on charger it can lead to short circuit.many of us simply use chargers because they look to fit in the charging ports of our phones.we should know that different chargers have different power input and different phones hace different power the can take in through their charging systems and PCB.if you use a charger of high power in put on a phone of low power receipt, then you end up burning parts of the circuit board.....

ATM hacking getting easy and an inreased trend of cyber robbery

As long as there are ATMs, hackers will be there to drain them of money. Although ATM-targeted “jackpotting” malware—which forces machines to spit out cash—has been on the rise for several years, a recent variation of the scheme takes that concept literally, turning the machine’s interface into something like a slot machine. One that pays out every time.
As detailed by Kaspersky Lab, so-called WinPot malware afflicts what the security researchers describe only as a “popular” ATM brand. To install WinPot, a hacker needs either physical or network access to a machine; if you cut a hole in the right spot, it's easy enough to plug into a serial port. Once activated, the malware replaces the ATM's standard display with four buttons labeled “SPIN”—one for each cassette, the cash-dispensing containers within an ATM. Below each of those buttons, it shows the number of bank notes within each given cassette, as well as the total values. Tap SPIN, and out comes the money. Tap STOP, and well, you know. (But at that point, ATM cyberthief, why would you?)
“These people do have a sense of humor and some spare time.”
Konstantin Zykov, Kaspersky Lab
Kaspersky started tracking the WinPot family of malware back in March of last year, and in that time has seen a few technical versions on the theme. In fact, WinPot appears to be something of a variation in its own right, inspired by a popular ATM malware dating back to 2016 called Cutlet Maker. Cutlet Maker also displayed detailed information about the contents of its victim ATMs, though rather than the slot motif it used an image of a stereotypical chef giving a wink and the hand gesture for “OK.”
The similarities are a feature, not a bug. “The latest versions of ‘cashout’ ATM software contain only small improvements compared with previous generations,” says Konstantin Zykov, senior security researcher at Kaspersky Lab. “These improvements allow the criminals to automate the jackpotting process because time is critical for them.”
That also goes some way to explaining the absurdist bent ATM hackers have embraced of late, an atypical trait in a field devoted to secrecy and crime. ATM malware is fundamentally uncomplicated and battle-tested, giving its proprietors space to add some creative flair. The whimsical tilt in WinPot and Cutlet Maker “is not usually found in other kinds of malware,” Zykov adds. “These people do have a sense of humor and some spare time.”
After all, ATMs at their core are computers. Not only that, they're computers that often run outdated, even unsupported versions of Windows. The primary barrier to entry is that most of these efforts require physical access to machine, which is one reason why ATM malware hasn’t become more popular in the US, with its relatively pronounced law-enforcement presence. Many ATM hackers deploy so-called money mules, people who assume all the risk of actually extracting money from the device in exchange for a piece of the action.
But WinPot and Cutlet Maker share an even more important trait than waggery: Both have been available for sale on the dark web. Kaspersky found that one could purchase the latest version of WinPot for as little as $500. That’s unusual for ATM hackers, who have historically kept their work closely guarded.
“More recently, with malware such as Cutlet Maker and WinPot, we see this attack tool is now commercially for sale for a relatively small amount of money,” says Numaan Huq, senior threat researcher with Trend Micro Research, which teamed up with Europol in 2016 for a comprehensive look at the state of ATM hacking. “We expect to see an increase in groups targeting ATM machines as a result.”
WinPot and Cutlet Maker represent only a slice of the ATM malware market. Ploutus and its variants have haunted cash machines since 2013, and can force an ATM to spit out thousands of dollars in mere minutes. In some cases, all a hacker needed to do was send a text message to a compromised device to make an illicit withdrawal. Typukin Virus, popular in Russia, only responds to commands during specific windows of time on Sunday and Monday nights, to minimize the chances of being found. Prilex appears to have been homegrown in Brazil, and runs rampant there. It goes on and on.
Stopping this sort of malware is relatively easy; manufacturers can create a whitelist of approved software that the ATM can run, blocking anything else. Device control software also can prevent unknown devices—like a malware-carrying USB stick—from connecting in the first place. Then again, think of the last bodega ATM you used, and how long it's been since it got any kind of updates.
So expect ATM hacking to only get more popular—and more farcical. At this point, it's literally fun and games. “Criminals are just having fun,” says Zykov. “We can only speculate that since the malware itself is not that complicated they have time to spend on these ‘fun’ features.”



Take a look at the story down as run by the observer newspaper on 14/09/2017

Two people have been arrested for allegedly hacking into the accounts systems of Centenary bank and transferring millions of shillings.
The two identified as Denis Etumu and Shalih Ajuna were picked from different areas of Kampala after being trailed by intelligence personnel from Central Police Station (CPS) Kampala.
Etumu was the first to be arrested around Mini Price complex in downtown Kampala. He was thereafter used to set up Ajuna who was also arrested.
According to the Kampala Metropolitan deputy police spokesperson Luke Owoyesigire, Centenary bank officials had earlier filed a complaint indicating that the Automated Teller Machines (ATMs) had been hacked by unknown personnel.
"When they complained that someone had interfered with their ATMs especially the one at Mini Price, we began investigations to establish who was behind the fraud, " Owoyesigire told URN.
Police initially retrieved CCTV camera footage around Mini Price which they used to single out Etumu. Preliminary investigations indicate that the suspects had set the ATMs in a way that they could easily retrieve details from various accounts.
Among the accounts which were hacked and money transferred account number 302007**** belonging to Prossy Nabukenya from which Shs 510,000 was transferred, 32007**** belonging to Proscovia Nalwayeso from which Shs 2 million was transferred and 320156**** belonging to Eva Mukasini from which Shs 650,000 was transferred among many others.
Detectives together with Centenary bank officials are still in the process of compiling all complaints falling under the same racket of fraudsters as well as tracing where exactly the money was transferred to.
Personnel from the police Cyber Crime Unit have also been deployed to help handle the case. Attempts to get a comment from Centenary bank were futile as none of their officials was willing to comment on the case.
The two suspects are also being tentatively charged with impersonation following recovery of two warrant cards of the Uganda People's Defence Forces (UPDF) believed to have been forged. The cards identify Etumu and Ajuna as soldiers at the rank of Captain. The warrant cards have been sent to the UPDF headquarters for verification.

Cyber security getting more important than ever

The age of digitization has led to many significant changes, both in our day-to-day lives and larger scale operations. One such example is the nature of terrorism. In the last decade or so, a new wave of terror attacks have surfaced — namely cyber-terrorism and cyber-warfare. 2017 saw one of the biggest cyber threats ever, in the form of malware built off a worm called “WannaCry.” Through a phishing scam, the malware managed to infect computers and lock systems down. This scam demanded $300 in bitcoins to get users back into their own files and devices.
The attack hit over 200,000 computers in 150 countries, including the United States, Russia, Britain, Spain, India, Taiwan, Ukraine, and more. Specifically, the targets included universities, the Russian Interior Ministry, FedEx, railway systems, and more. One of the worst hit targets was Britain’s National Health Services. Because hospitals, ambulance companies, and doctors’ offices were hit, outpatient services had to be canceled and surgeries had to be rescheduled.
Large Scale Attacks
With major disruptions caused internationally, the “WannaCry” attack is undoubtedly one of the most damaging cyber threats the world has experienced. But what is it that makes such large-scale attacks possible? In an article on The Week , author John Spross claims that the process of globalization is one of the culprits. This is because globalization rests on a foundation of worldwide interconnections. Therefore, this creates a world where telecommunications allow us to connect easily. This digitally connected world, in turn, is vulnerable to attacks like “WannaCry.”
Later in 2017, the United States government took a rare step and attributed “WannaCry” to North Korean backed hackers. In a broader sense, cyber threats like “WannaCry” have exposed major systemic risks, showing the potential for the rising threat of cyber terrorism. Spross, in his article on The Week, asks the very relevant question, “If such attacks continue — and plenty of experts say they will — how will globalization adapt? Can it even survive?” Looking back at global cyber threats such as these, some alarming emerging trends are beginning to take shape.
The Consequences of Cyber Threats are Dire
In the modern age, companies are very dependent on their data and systems. Therefore, any interference with their processes can wreak havoc. From affecting market capitalization and endangering executive leadership, to major losses in sales and diminished profits, cyber-crime has the potential to destabilize major enterprises in a matter of a few hours. Additionally, cyber-criminals are becoming more bold. For example, many have shifted their targets from the pockets of consumers to global economic giants.
Today, this changing trend in the nature of cyber threats is of much concern to the banking industry. After all, large-scale attacks can cause a “run” on the global banking system in a worst-case scenario. A digital blackout following a cyber-attack makes it difficult to carry out even normal business transactions.
While advanced cybersecurity is a must, businesses must also employ basic (and often overlooked) security measures. Some of these measure include installing anti-viruses and utilizing online signatures . These methods will help ensure that your business does not come to a complete standstill in the wake of cyber threats. Hopefully, basic communications from personal devices can carry on, making it easier to take immediate restrictive action.
Cyber-threats Are Becoming Increasingly Sophisticated
Hackers continue to increase in sophistication, and have access to very advanced hacking tools through a thriving black market. Cyber threats are very well funded, thoroughly coordinated, and sometimes even sponsored by entire nations. Even a company like Deloitte, known to be the world’s largest cybersecurity consultant, is vulnerable to attack, as shown by their security breach in October 2017.
In this volatile cyberworld, it is almost safer for businesses to assume that they will inevitably be breached at some point in time. With this assumption, they are then forced to implement adequate controls and
employ professionals that specialize in cybersecurity so they can detect unusual activity and minimize damage and disruption.
States Are Far From Immune
As of late, the involvement of various opposing countries in cyber operations is becoming apparent. In fact, according to the Cyber Operations Tracker by the Council on Foreign Relations (CFR), 22 countries are suspected of having sponsored cyber operations, including the United States.
From using cyber operations to cause widespread power outages to hacking and rigging elections, countries and large populations are often the unfortunate victims of cyber threats. Possible tactics by hackers include distributed denial-of-service attacks. Additionally, ransomware aims to disrupt and destabilize government computer networks and systems. In times like these, keeping elections safe and secure should be a top priority for officials. States have also started sanctions and indictments to punish their alleged attacker and/or state-sponsor.
For globalization to effectively survive, we must give cybersecurity due importance. As the world becomes more and more connected, nation states and governing bodies must tighten cyber regulations and invest in security measures. Today, in light of these emerging cyber threats, it is vital to take cybersecurity more seriously than ever before.

Saturday, February 23, 2019

Bug Allows Bypass of Face ID and Touch ID Authentication of WhatsApp iOS version
A Reddit user has discovered a method to bypass recently introduced Face ID and Touch ID authentication for WhatsApp iOS version.
Earlier his month WhatsApp introduced authentication feature for its iOS version allowing users to unlock their phone using Face ID and Touch ID.
Users can enable this feature by going to Settings -> Account -> Privacy -> Screen Lock in WhatsApp. Users can also set a time interval to application lock itself like immediately, after 1 minute, after 15 minutes, or after 1 hour.
Now a Reddit user has discovered a method to bypass this authentication unless the time duration is set to immediately.
According to the user, Face ID and Touch ID authentication can be easily bypassed by using the Share Sheet in iOS. The share sheet allows sharing information from the current context with apps, social media accounts, and other services.
1. Get to the iOS Share Sheet using any method.
2. Click on the WhatsApp icon in iOS Share Sheet.
3. While transitioning to the next screen, you observe that no FaceID or TouchID verification takes place if an option other than “Immediately” was set previously. Now just exit out to the iOS Home Screen. (If in some cases, it asks for FaceID or TouchID verification, just cancel it and try clicking on WhatsApp icon in the iOS Share Sheet again).
4. Now try to open WhatsApp, you will be able to access WhatsApp without FaceID or TouchID authentication.
Whatsapp has already addressed the bug in the latest version of the iOS app released. All iOS users are advised to update their application immediately.
The Bounty Hunter Anand Prakash – Bug Bounty Hunter does it again
Anand Prakash and his colleague at it again managed to unveil the essential API related vulnerability which led to the leakage of client secret and server tokens of all Uber developer applications. Anand Prakash – bug bounty hunter does it again
Anand Prakash, AppSecure is a top-ranked hacker to be precise 4th worldwide and 1st in India on Uber’s bug bounty program. He has earned more than 25 lakhs approx $35000 till date from Uber alone. This is not the first time the bug bounty hunter is doing it either, earlier in 2018 he managed to identify an issue on Tinder allowing them to login into any tinder account.
The bug bounty hunter is also ranked 3rd worldwide and 1st in India on Twitters bug bounty program.
AppSecure led by Anand Prakash and Manisha Sangwan managed to identify an essential API flaw which led to leakage of client secret and server tokens of all Uber developer applications.
According to internet reports, the issue was scrutinized by the Uber engineering team and rewarded them with 3.5 lakhs INR (5000 USD) bounty.
The hackers were able to use the vulnerability which pointed out particularly on riders. Uber within which they could point out public API endpoints of https://riders.uber.com/ . Which the hackers used to see client secret of all Uber applications, the issue has been resolved by Uber by removing the extra response from the API response.

The Uber documentation says:The secret for your application, this should be treated like your application’s password. Never share this with anyone, check this into source code, or post in any public forum. Additionally, this should not be distributed on client devices where users could decompile your code and access the secret. If you suspect your client secret has been compromised you may generate a new one in your application’s dashboard which will immediately invalidate the old secret.
The hackers used to exploit this issue by connecting to any Uber application with his Uber account. Navigate to the vulnerable endpoint to see the leaked data in API response.
How the exploit worked step-by-step
Step #1
Hacker connects to a random Uber developer application to his account using OAuth. IFTTT, Pay fare, Bixby are some of the examples of Uber developer applications. It is not identified as a complicated procedure as of now.
Step #2
Once the hackers connects with the above apps to his Uber account which he/she can use against endpoint to get the developer application’s confidential data. The other significant information of the application using the attacker’s session data.
The vulnerability was reported to Uber on 5th October 2018 by Anand Prakash and Uber agreed to publicly disclose it on February 8th, 2019.

I have got another way of using facebook without paying OTT.. I will never use VPN and. I will never pay OTT

After MTN interrupting in one way i used to loginto Facebook, WhatsApp, Instagram and twitter...... I ...i have designed another way of ysing social Media without paying OTT taxes.