MTN Uganda has done a very good thing... I love the way Uganda is calculating it's thing. It very easy now to send receive money from Uganda to the whole of Eastern Africa. Man mobile money can now be used to send and receive money through out Kenya, Rwanda and Tanzania..... You simply have to Dial *165*1*2# .This is very good to those who have been stuck and caught up in the recent saga of the closure of Rwanda Uganda border...you can now send your money to your families... No more starving!!!
An experienced CYBER SECURITY ANALYST dealing in transborder crimes on phones,computers,threat intelligence, bug hunting,.... White hat hacking and Repairing phones and reviewer of new technology gadgets
Tuesday, May 28, 2019
Wednesday, May 22, 2019
Five people killed in Somalia
At least five people have been killed among them two soldiers and police officer in a car bomb explosion near Godka Jiloho prison in Bondhere district, Mogadishu.
Sources have said that two soldiers-a couple, the wife identified as Faay Ali Rage were killed during the blast. According to eyewitnesses, the vehicle which was parked at a roadblock heading to the prison blew up leaving death and destruction in its wake.
Media ne
ws has also established the third victim, a police officer was attached to the security team of MP Maryan Arif.
The free ambulance service Aaamin Ambulance said 10 people were injured in the blast. The medical provider said of the injured, one was a child while two were female.
Sources have said that two soldiers-a couple, the wife identified as Faay Ali Rage were killed during the blast. According to eyewitnesses, the vehicle which was parked at a roadblock heading to the prison blew up leaving death and destruction in its wake.
Media ne
ws has also established the third victim, a police officer was attached to the security team of MP Maryan Arif.
The free ambulance service Aaamin Ambulance said 10 people were injured in the blast. The medical provider said of the injured, one was a child while two were female.
Windows 10 ZERO day vulnerability revealed
Windows 10 has another zero-day vulnerability, as discovered by a security researcher who specializes in finding bugs in Microsoft’s operating system – and has previously publicly outed them without warning before.
The unpatched vulnerability highlighted by SandboxEscaper has been confirmed to work on Windows 10 (32-bit) systems, as reported by
ZDNet. Furthermore, with some tweaking, it could theoretically be leveraged against any version of Windows (going as far back as Windows XP).
Utilizing a bug in the Task Scheduler in Windows, this is a local privilege escalation security flaw, meaning it can be used by a hacker to raise an account with low-level privileges on a PC to a full admin account (in other words, allowing them to do anything on the victim’s computer).
Note, however, that this security flaw can’t be used to gain access to a PC. It’s an exploit for malicious parties who have already hacked their way onto a computer, and a way for them to subsequently elevate their privileges to be able to do more.
Even so, this is obviously something Microsoft needs to address swiftly, and will perhaps be patched in the next round of security updates to arrive in June.
More where that came from
As we mentioned at the outset, SandboxEscaper is renowned for being a thorn in Microsoft’s side, and in October 2018 she released details of a bug that can also be abused to elevate privileges on a system, and
drew attention to a similar flaw back in August 2018.
More worryingly, she has also claimed that she’s found four further unpatched bugs in Windows, so we can expect more revelations in the pipeline fairly soon, no doubt.
SandboxEscaper previously highlighted these bugs on Twitter, but seemingly has had several of her Twitter accounts suspended in the past.
The unpatched vulnerability highlighted by SandboxEscaper has been confirmed to work on Windows 10 (32-bit) systems, as reported by
ZDNet. Furthermore, with some tweaking, it could theoretically be leveraged against any version of Windows (going as far back as Windows XP).
Utilizing a bug in the Task Scheduler in Windows, this is a local privilege escalation security flaw, meaning it can be used by a hacker to raise an account with low-level privileges on a PC to a full admin account (in other words, allowing them to do anything on the victim’s computer).
Note, however, that this security flaw can’t be used to gain access to a PC. It’s an exploit for malicious parties who have already hacked their way onto a computer, and a way for them to subsequently elevate their privileges to be able to do more.
Even so, this is obviously something Microsoft needs to address swiftly, and will perhaps be patched in the next round of security updates to arrive in June.
More where that came from
As we mentioned at the outset, SandboxEscaper is renowned for being a thorn in Microsoft’s side, and in October 2018 she released details of a bug that can also be abused to elevate privileges on a system, and
drew attention to a similar flaw back in August 2018.
More worryingly, she has also claimed that she’s found four further unpatched bugs in Windows, so we can expect more revelations in the pipeline fairly soon, no doubt.
SandboxEscaper previously highlighted these bugs on Twitter, but seemingly has had several of her Twitter accounts suspended in the past.
ARM chipsets will nolonger be working with Huawei
Huawei’s ambitions for the smartphone market have been dealt a serious blow according to leaked documents that suggest chipmaker ARM is suspending all activities with the beleaguered Chinese vendor.
Last week, the US Commerce Department prohibited American firms from doing business with Huawei, a move which means the company’s handsets will no longer receive updates for the Android operating system from Google or access to its popular applications.
However, the impact of that order is set to be far-reaching and could have even more disastrous consequences. The BBC has obtained internal memos ordering ARM employees to stop working on all Huawei contracts and cases to provide any support.
ARM’s chip designs are used to power virtually every major mobile chipset, including those from Qualcomm and Huawei’s Kirin processors. ARM is based in the UK and owned by Japanese firm SoftBank, but many of its designs feature US-made technology.
This has led ARM to believe that working with Huawei would see it breach US trade regulations. The BBC also notes that this impacts ARM China, a joint-venture that aims to make ARM technology and localised support available in the country. ARM has a 49 per cent stake.
Huawei is not commenting on the reports, but an inability to use ARM technology in Huawei’s Kirin processors would be extremely damaging. Huawei has been preparing for a ban on US technology for some time, stockpiling components and developing an alternative operating system to Android, but the innovations afforded by ARM would be impossible to replace.
The upcoming Kirin 985 chip is unaffected, but Huawei would be unable to use ARM technology in future iterations.
A Huawei spokesperson said: "We value our close relationships with our partners, but recognise the pressure some of them are under, as a result of politically motivated decisions. We are confident this regrettable situation can be resolved and our priority remains to continue to deliver world-class technology and products to our customers around the world.”
Huawei has managed to build on domestic success by expanding into Western Europe in recent years thanks to a series of critically acclaimed devices. It is now the world’s second largest manufacturer, recently overtaking Apple, despite being excluded from the US.
Last week, the US Commerce Department prohibited American firms from doing business with Huawei, a move which means the company’s handsets will no longer receive updates for the Android operating system from Google or access to its popular applications.
However, the impact of that order is set to be far-reaching and could have even more disastrous consequences. The BBC has obtained internal memos ordering ARM employees to stop working on all Huawei contracts and cases to provide any support.
ARM’s chip designs are used to power virtually every major mobile chipset, including those from Qualcomm and Huawei’s Kirin processors. ARM is based in the UK and owned by Japanese firm SoftBank, but many of its designs feature US-made technology.
This has led ARM to believe that working with Huawei would see it breach US trade regulations. The BBC also notes that this impacts ARM China, a joint-venture that aims to make ARM technology and localised support available in the country. ARM has a 49 per cent stake.
Huawei is not commenting on the reports, but an inability to use ARM technology in Huawei’s Kirin processors would be extremely damaging. Huawei has been preparing for a ban on US technology for some time, stockpiling components and developing an alternative operating system to Android, but the innovations afforded by ARM would be impossible to replace.
The upcoming Kirin 985 chip is unaffected, but Huawei would be unable to use ARM technology in future iterations.
A Huawei spokesperson said: "We value our close relationships with our partners, but recognise the pressure some of them are under, as a result of politically motivated decisions. We are confident this regrettable situation can be resolved and our priority remains to continue to deliver world-class technology and products to our customers around the world.”
Huawei has managed to build on domestic success by expanding into Western Europe in recent years thanks to a series of critically acclaimed devices. It is now the world’s second largest manufacturer, recently overtaking Apple, despite being excluded from the US.
Monday, May 13, 2019
He who likes playing about with faeces,cannot and will never stop until the faeces have dropped on his lips!!!
Just
like they did to spark off genocide in Rwanda by killing former president Juvenal Habyarimaana, the Kagame regime is hatching many more plans to cause a lot of instabilities in the region and possibly genocide.
like they did to spark off genocide in Rwanda by killing former president Juvenal Habyarimaana, the Kagame regime is hatching many more plans to cause a lot of instabilities in the region and possibly genocide.
According to credible information from a reliable source, a RPF captain, Cpt Olivier who rents houses for RPF spies in Nairobi kenya has been part of the plan to destabilize Uganda in order to have Uganda expel Rwandan refugees so that the Rwandan regime can subject them to imprisonment or even death. He was working with “Kawukumi in Uganda police to illegally deport Rwandan refugees so that the regime in Rwanda can arrest them.
It is not only Uganda that Rwanda has been trying to destabilize but also other countries in the great lakes region which include Zambia, Burundi, DRC among others.
The operation of destabilizing Zambia is being run by a one Col. FaustianTinka who works at Rwanda’s embassy in Tanzania. Tinka who works on the orders of Dan Munyuza is working closely with Abel Buhungu(the charge d’ affairs at the high commission of Rwanda in Zambia) to execute the mission.
Through the corporation between Rwanda and South African countries, Col. Tinka has been under the guise of Rwanda Tanzania friendship association (RWATAFA), smuggling spies from Rwanda safe houses in Kenya to Zambia who are received by Abel Buhungu. The spies are working on a mission to destabilize Zambia so that Zambia can forcefully repatriate the Hutu refugees living there.
Col. Tinka and Buhungu are identifying people who can incite Zambian youth to attack the Rwandan refugees, loot their shops and kill them to have them flee the country. The plan is to kill innocent Zambians and then blame it on Rwandan refugees in order for the Zambians to retaliate.
In order for the operation to be successful, the Rwandan regimes have invested 1million dollars to corrupt security officers and some politicians in Zambia who will be demanding the Zambian government to deport the Rwandans. Part of the money is being given to the youth to kill Rwandans.
8 people have been killed so far and the locals are being told that it’s the interahamwe killing them in ritual sacrifices. Rwanda government wasn’t happy with Zambia hosting its refugees and this is why they want to destabilize it.
The plot to destabilize DRC is being executed by the Al-Qaeda Islamic Maghreb (AQIM). There is clear evidence that Paul Kagame is working with the AQIM and he has provide a home to their coordinator MoustaphaOuld Lima.
Moustapha is one of the most wanted people on the continent for terrorism. He is the coordinator of AQIM an Al-Qaeda affiliate in the Sahara desert and had direct contact with the former Al-Qaeda commander Osama bin laden.
Surprisingly Last week Kagame appeared with MoustaphaOuld Lima at Kigali international airport to receive Qatar supreme leader Tamim Bin Hamad Al Thani. This clearly showed how close Kagame and the AQIM leader are.
AQIM makes millions of dollars by kidnapping tourists, expatriates, and business men in Burkina Faso, Ivory Coast, Niger, Mali Mauritania and Algeria.
It seems he has started the business in the great lakes region since the kidnap of tourists has increased in DRC. This further explains why ISIS claimed its first attack in DRC recently.
may be he is seeking to compel USA in questing for the use of UPDF in fight against alshabab
Thanks to https//www.command1post.com
Saturday, May 11, 2019
I hear one asking why these kagame generals are in kinshasha!!!! That us not news
Why nyamvumba and kabandana are in DRC??!!This was a question someone asked me yesterday...yes the Nyamvumbas arrived here yesterday with a group for special discussion about FDLR,RNC and principally on BURUNDI and other discussions on alleged relationship of
FDLR,RNC and,UGANDA and massive brutal disccussions about BURUNDI,But as these discussions may take a serious resolution ,any mistake against and on Nkurunzizas country may be the outbreak and may be an "imbarutso" to someone's demise......Themselves are the key points in the discussion....but I think someone is trying to plunge himself in what he is not prepared for!!!!
Friday, May 10, 2019
Monday, May 6, 2019
Thank you Major sankara...... The brother takes over!
Rwanda’s National Liberation Forces (FNL) has appointed Capt Herman Nsengimana as its spokesperson replacing Maj Calixte Sankara who is being held by Rwandan government.
In a statement sent to this website, FLN’s political wing said Major Calixte Nsabimana Sankara who was arrested by the Kigali regime services is unable to conduct his spokesperson duties.
“MRCD informs Rwandans, EAC, SADEC member states and the rest of the International Community that; effective from today, Captain Herman Nsengimana is the new FLN spokesperson” the statement said.
It added that Captain Nsengimana is a high caliber soldier, with a history of a very close working relationship with Maj Sankara; hence his designation is expected to not only fill Major Sankara’s shoes but also increase the struggle’s momentum and morale of its troops.
“We therefore request all patriotic Rwandans and all FLN sympathizers to rally behind him in the same impetus as that provided to our irreplaceable hero, Comrade Major Sankara”.
The statement signed by the MRCD president Paul Rusesabagina denounced the communiqué dated the 4th of May 2019 and circulated on social media, designating Captain Nahimana Straton as the new FLN spokesperson.
“It was a FALSE communiqué created by RPF agents in an attempt to mislead the public” Paul Rusesabagina added.
“With the appointment Captain Nsengimana, recent boost in our cadres and troop’s morale and the International Community response in regards to Major Sankara’s kidnap should serve as a strong message to General Paul Kagame and his oppressive regime that; Major Sankara’s patriotism and ideals are immortalized in the hearts of millions of Rwandans and beyond”.
Paul Rusesabagina called on Rwandans across the world and all sympathizers to continue their support to FLN’s armed struggle as the only way to defend Major Sankara’s cause and legacy.
Sunday, May 5, 2019
Google Chrome’s mobile browser has been targeted with a relatively simple phishing technique by developer Jim Fisher. According to Fisher, the exploit involves tricking victims into handing over their private information by manipulating the trusted websites of the user.
By using a combination of coding and screenshots, the victims can be easily deceived, explained Fisher in his personal blog post. The reason is a flaw identified in the mobile version of Chrome that lets hackers trick users into thinking that they are visiting an official or authentic website while in reality, it is the fake version that they are visiting.
This could be particularly worrying when a user is visiting the bank website as the information about the bank account number and password for online banking will be shared with the attacker.
See: Phishing Scams: 5 Excellent Tips That Will Protect You
Fisher has developed and disclosed a proof-of-concept too. However, so far there is no indication that the vulnerability has been exploited. Although the vulnerability is identified in Chrome at the moment, Fisher believes that other browsers may also be susceptible.
In new versions of Chrome for mobile devices, the address bar disappears when the user scrolls through the page so as to give the user extended display. What happens in this new wave of phishing attacks is that the attackers are exploiting this very feature of Chrome mobile browser. After the address bar is hidden, the hackers enable their own
fake version of the website along with an SSL badge to appear on the screen as soon as the user stops scrolling.
However, originally, the address bar doesn’t appear on its own. This is termed by Fisher as a scroll jail for users as there is page uploaded within a page. When the user tries to scroll back up to access the address bar, it doesn’t let them do so and hence, the user is trapped in a loop.
Fisher displayed how the trick worked in the proof-of-concept, where he can be seen changing the URL of his own website with that of HSBC Bank. To make the scam even more sophisticated, hackers can add coding.
The fix is not easy for this flaw and Chrome developers will have to think out-of-the-box to eradicate the issue given the interactive element involved. Fisher has dubbed this scam the “inception bar” and currently Android mobile users
By using a combination of coding and screenshots, the victims can be easily deceived, explained Fisher in his personal blog post. The reason is a flaw identified in the mobile version of Chrome that lets hackers trick users into thinking that they are visiting an official or authentic website while in reality, it is the fake version that they are visiting.
This could be particularly worrying when a user is visiting the bank website as the information about the bank account number and password for online banking will be shared with the attacker.
See: Phishing Scams: 5 Excellent Tips That Will Protect You
Fisher has developed and disclosed a proof-of-concept too. However, so far there is no indication that the vulnerability has been exploited. Although the vulnerability is identified in Chrome at the moment, Fisher believes that other browsers may also be susceptible.
In new versions of Chrome for mobile devices, the address bar disappears when the user scrolls through the page so as to give the user extended display. What happens in this new wave of phishing attacks is that the attackers are exploiting this very feature of Chrome mobile browser. After the address bar is hidden, the hackers enable their own
fake version of the website along with an SSL badge to appear on the screen as soon as the user stops scrolling.
However, originally, the address bar doesn’t appear on its own. This is termed by Fisher as a scroll jail for users as there is page uploaded within a page. When the user tries to scroll back up to access the address bar, it doesn’t let them do so and hence, the user is trapped in a loop.
Fisher displayed how the trick worked in the proof-of-concept, where he can be seen changing the URL of his own website with that of HSBC Bank. To make the scam even more sophisticated, hackers can add coding.
The fix is not easy for this flaw and Chrome developers will have to think out-of-the-box to eradicate the issue given the interactive element involved. Fisher has dubbed this scam the “inception bar” and currently Android mobile users
Subscribe to:
Posts (Atom)
-
With the widespread availability of the Internet today, there are still times when it may not be feasibly available. Be it on a flight, du...
-
msticpy is a package of python tools intended to be used for security investigations and hunting (primarily in Jupyter notebooks). Most ...
-
A new way for cybercriminals to create fake social media profiles and carry identity scams using Artificial Intelligence powered tool? A ...