Saturday, May 2, 2020

Lockheed Martin has won more than $6 billion to produce interceptors


Lockheed Martin has won more than $6 billion to produce interceptors and other equipment for the Patriot anti-aircraft and anti-missile defence system, the US Department of Defence said in a press release.
"Lockheed Martin Corporation of Grand Prairie, Texas, was awarded a $6,068,344,959 firm-fixed-price contract ...to produce Phased Array Tracking Radar to Intercept on Target Advanced Capability-3 missiles, missile segment enhancement configuration and associated ground support equipment and spares", the release said on Thursday.
The contract also includes incidental services, hardware, facilities, equipment, and all technical, manufacturing and testing efforts, missile segment enhancement configuration, and associated equipment, the Defence Department added.
Work on the contract will continue over the next seven years with an estimated completion date of 2027 in Huntsville, Alabama; Camden, Arkansas; Ocala, Florida; Chelmsford, Massachusetts; Grand Prairie and Lufkin, Texas; and Archbald, Pennsylvania, the release said.
On 1 April, Lockheed Martin was awarded a contract worth more than $818 million to produce 790 Joint Air-to-Surface Standoff Missiles (JASSM).

Kim Jong Un is not dead!


Kim Jong-un's well-being has been a matter of speculation over the past several weeks as the North Korean leader has been conspicuously absent from public events which led to rumours that he was either ill or even dead.
A video of North Korean leader Kim Jong-un inspecting a fertiliser plant in Sunchon after his several-week absence from public functions has been shared by the Korean Central News Agency.
In the footage, the supreme leader is seen cheered by locals in face masks outside of the plant, waving flowers and flags. Kim himself was filmed talking with top officials, seemingly in good health and spirits. Notably, none of them was wearing any facial protection.
May 2, 2020
He was also seen examining a machine installed in the plant and giving instructions to officials who escorted the chairman. Kim, a habitual smoker, was also spotted with a cigarette during a meeting at the facility.
Kim's previous public appearance took place on 12 April and his several-week-long absence, coupled with reports that he had been undergoing treatment following a heart-related surgery, fuelled rumours that he was gravely ill or even dead.

Android ransomware found extorting credit card information

Ransomware has long been one of the infamous malware types out there, perhaps due to the payday that it brings in. This has incentivized hackers to add such functionality to existing malware programs and this time Android ransomware is targeting unsuspecting users.
One such example is of the Black Rose Lucy malware family which was discovered in 2018 serving as a botnet and a dropper. Since then though, it has added ransomware capabilities targeting Android devices as discovered by researchers at Checkpoint.
See: How To Prevent Growing Issue of Encryption Based Malware (Ransomware)
Once Lucy infects a device, it starts by encrypting all the data on it and then displays a ransom note in the browser. The note claiming to be from the FBI scares the victim into believing that they have been found possessing pornographic material on the device which leads to a range of criminal offenses.
Furthermore, it states that their details have been sent to the FBI Cyber Crime Department’s Data Center and they should pay a sum of $500 as a fine.


A snapshot of the ransom note

A unique aspect emerging from this is that the payment is demanded by a request of credit card details rather than the usual method of receiving money via anonymity centric cryptocurrencies like Monero or
Bitcoin .
Featuring 4 encrypted C2 servers as a part of its code; these can be used by the malicious program to receive commands performing a range of tasks including but not limited to:
Making a phone call on any number specified.
Letting the server know of all installed applications on the device.
Opening a remote shell on the device which can let the attackers control the device remotely and also gain administrator privileges.
Deleting the malware itself.
How Lucy manages to infiltrate a smartphone is by abusing Android’s in-built accessibility features. As the researchers explain in a blog post,
Thereby, posing as a legitimate video application, the malware is installed without any user action making the process seamlessly smooth.

To add to this, 80 samples related to Lucy were found to be distributed through social media & instant messaging apps. The names of these apps aren’t known as of yet.
Concluding, this is one of the few smartphone ransomware that have been seen currently in the cybersecurity world with the majority usually aimed at larger computer systems . Hence, it would be just to say that this hints towards another trend arising that would haunt the world of smartphones soon.
This, however, is not the first time that Android users have been targeted by ransomware. Last year, ransomware was found infecting devices through pornographic posts . The list of ransomware infections against Android devices is never-ending.
To protect yourself, refrain from downloading any file regardless of its format from an unreputable source on your phone and also install a good anti-malware program alongside .

EventBot malware has ability to steal your bank,credit card details

EventBot malware has been active since March 2020.

Being a major mobile platform, Android is frequently targeted by hackers because of the lucrative benefits associated with it. That’s one major reason Android users normally find themselves coming across new types of malware built for the platform almost everyday.
Such is the case of a recent report by the Cybereason Nocturnus team who has discovered a new type of android Malware dubbed EventBot first seeing it in March 2020. To continuously accomplish its purpose, the attackers behind this malware have been releasing new versions with improvements & increased functionality over time. Currently, 4 of these were found named Version 0.0.0.1, 0.0.0.2, and 0.3.0.1 and 0.4.0.1.
The malware is believed to be a banking trojan and infostealer that exfiltrates important financial data from over 200 banking and cryptocurrency apps. This data is comprised of personal data, passwords, keystrokes, and banking information among others allowing EventBot to hijack transactions.
The targeted apps include the likes of PayPal, Coinbase, Barclays, Santander UK, and HSBC UK, among others, pointing to the fact that the majority of them are based in the United States & Europe in countries such as Italy, the UK, Spain, Switzerland, France, and Germany.
New Android malware targets over 200 top financial apps
Complete list of the apps targeted by EventBot (Via Cybereason)
EventBot uses different techniques to gain unauthorized access. Firstly for it to get installed on the victim’s device, it poses as a legitimate application on different third-party app stores. Unsuspecting users download these leading to the malware gaining a hold on their device.
New Android malware targets over 200 top financial apps
Some icons of the apps it has been imitating (Via Cybereason)
Once installed, it asks for permissions that it does not need including but not limited to accessing accessibility features, reading from external storage, letting the app run & use data in the background, allowing it to install packages & open network sockets, and open & read text messages. The lattermost permission also allows it to bypass two-factor authentication (2FA).
New Android malware targets over 200 top financial apps
An example of one such permission request (Via Cybereason)
All of these then allow EventBot to function unhindered as a keylogger collecting data from any open windows and other applications. To send the collected data back to the attackers, it also downloads C2 server URLs with the data sent is encrypted using Base64, RC4, and Curve25519 depending on the respective version currently operating.
Concluding, coming to the question of attribution, Cybereason said in its blog post that they could not find any sources connected to it on “underground communities”. One reason may be that EventBot is “still undergoing development and has not been officially marketed or released yet.”
For Android users who may be concerned, as evident, the easiest way to avoid being infected is to not install apps through third-party stores and stick to Google's playstore. Moreover, EventBot should not be underestimated because as in the words of the researchers themselves,
This brand new malware has real potential to become the next big mobile malware, as it is under constant iterative improvements, abuses a critical operating system feature, and targets financial applications.

The Five Eyes intelligence agencies of the US, the UK, New Zealand, and Australia have allegedly accused China of scrapping evidence of the coronavirus outbreak,

The Five Eyes intelligence agencies of the US, the UK, New Zealand, and Australia have allegedly accused China of scrapping evidence of the coronavirus outbreak, in what they claim amounts to an “assault on international democracy”.
In a 15-page research dossier,obtained by daily telegraph, the Five Eyes painted an alleged picture of “how the Chinese government deliberately covered up the coronavirus by […] destroying evidence from the Wuhan laboratory and refusing to provide live virus samples to international scientists working on a vaccine”, according to the Australian newspaper.
The dossier also claimed that Chinese authorities denied COVID19 could be spread between humans until 20 January, “despite evidence of human-human transmission from early December”. The Five Eyes also blame the World Health Organisation (WHO) for supporting Beijing’s stance.
The accusations come after Australian Prime Minister Scott Morrison told reporters on Friday that Canberra “has nothing” in terms of evidence to support speculations that the covid19 outbreak came from a Chinese lab late last year.
Morrison added that although “we know it [the outbreak] started” in China’s Wuhan, and “the most likely scenario that has been canvassed relates to wildlife wet markets”, it is “a matter that would have to be thoroughly assessed”.

Trump Says He ‘Hasn’t Seen’ Intel Statement on COVID-19 Origin

The remarks followed US President Donald Trump saying during Thursday’s press briefing that he “hasn’t seen the statement" by the office of Acting Director of National Intelligence Richard Grenell which, in particular, read that “the Intelligence Community […] concurs with the wide scientific consensus that the covid19 virus was not manmade or genetically modified”.
The office was previously echoed by chairman of the US Joint Chiefs of Staff, General Mark Milley, who stated that the country’s intelligence community agreed that the coronavirus was a natural pandemic and not linked to the laboratory facility in Wuhan, adding, however, that “we do not know for sure".
This came after WHO epidemiologist Maria van Kerkhove said earlier in April that China's upward revision of its coronavirus death toll is "an attempt to leave no case undocumented".
Health authorities in Wuhan, the very epicentre of the pandemic, revised the local death toll upward by 50%, to 3,869 from the earlier reported 1,290, thus acknowledging that they had not counted many fatalities, including people who died at home or in detention centres.
In a separate development in April, Trump withdrew the new funding of WHO after accusing the body of conspiring with China to conceal the real state of affairs about the coronavirus.
China has vehemently dismissed allegations that it reacted too slowly, or tried to cover up the initial outbreak of the coronavirus on its soil. In early April, Chinese Foreign Ministry spokeswoman Hua Chunying told reporters that “the comments made by those US politicians are just shameless and morally repulsive; they should abandon such politicising of public health issues".

China commences a mega 5G project on Mount Everest

Despite the ongoing US crackdown on Huawei, in place since May 2019, the Chinese tech giant continues to stay afloat, vowing to find replacements for American technologies in the near future to become independent of them.
Huawei Technologies and the network operator China Mobile have completed the world’s highest 5G base station at an altitude of 6,500 metres in the Mount Everest area, according to a press release.
The station, along with another two that were earlier installed at an altitude of 5,300 metres and 5,800 metres in the area, provides full 5G coverage of Mount Everest on the north ridge as well as the summit, with online download speed reportedly standing at about 1 gigabit per second.
The world’s highest peak, Mount Everest has an altitude of more than 8,840 metres (29,029 feet).
“Huawei strongly believes that technology means to make the world better. The beauty of Mount Everest can be displayed via 5G high-definition video and VR experience, which also provides further insights for mountaineers, scientists and other specialists into the nature. The ground-breaking establishment on Mount Everest once again proves that 5G technology connect mankind and the Earth harmoniously”, the press release underscored.
The remarks were echoed by China Mobile which, in turn,  the 5G project on Mount Everest as “not only another extreme challenge in a human life exclusion zone”, but also as something that “laid a solid foundation for the later development of 5G smart tourism and 5G communications for scientific research”.
The newspaper South China Morning Post earlier reported that about 25 kilometres of new optical cables had been laid out to support the project, with at least 150 China Mobile employees involved in the work.  

US Crackdown on Huawei

The installation of the world’s highest 5G base station comes as Huawei is still grappling with washington's crackdown that begun in May 2019, when the Department of Commerce prohibited internet providers from using the company’s products and US tech companies from selling technologies (hardware and software) to Huawei without obtaining a special license first.
The White House claims that the company is collaborating with the Chinese government to allow the latter to spy on those who use the tech giant's equipment, allegations that have been rejected by both Beijing and Huawei.
The US also began a campaign of discouraging countries from allowing the firm to build national 5G networks using similar claims, despite rejections from the UK, France, Germany, the Czech Republic, and some Canadian telecom providers.

Wednesday, April 15, 2020

Ugandan students stuck in the lockdown can now carry on with lessons and subjects exercises online by visiting https://epapers.visiongroup.co.ug/?fbclid=IwAR0wfPokI0APIeZNiJA9_ihDoBwnIt2LDDWxWh3CLXeg0YlBK_v7VERSXbo

https://epapers.visiongroup.co.ug/?fbclid=IwAR0wfPokI0APIeZNiJA9_ihDoBwnIt2LDDWxWh3CLXeg0YlBK_v7VERSXbo
All students can visit this site..youvwill get activities in your subjects!!! You can carry on with your lessons until the country will be free from covid.....It is even better that the curriculum  now entails  the doing of exams at yhe end of year!
and let the gorvenment must make sure this link must also  be accessed in offline mode!!!Out telecom companies  can try to help...if we had zero facebook, why can't  we do it also
you can also visit these sites.

1.    etutoring.gayazahs.sc.ug

2.  revisionnow.net

Stop using Covid19 saga to promote hatred and rumours that can incite violence and panick

Beware of this you post on social media,if it is to spread rumours;promote hatred,and misguiding citzens!!! You have the right to belong to any political affiliation but you will never have any right to disturb people's  peace.I know some of you just want to make the public hear that so and so has been arrested!Yes you will be arrested because  you are a problem! Covid19 will not know whether you are People power;FDC,NRM,DP...it will not even know whether you are Bobi wine,Besigye, and even it will not know whether it is Exellence Museveni!Do you think president Museveni sleeps well amid this terrible time?Have you ever seen him on media this many times? ??please atleast if you hate gorvenment why can't  you love ugandans??? !!we all need to enmass our efforts to fight it.I know some of you want to hear that cases are in mbarara,kabale,arua ,kotido...and you start  your dangerous rumours!!!!!...

Let me tell you;if one of your relatives had contracted it am sure that you won't  be posting this bogus!!!
Stop this nonsense;otherwise  i assure you that you will be delt with mercilessly!!!!!
Actually; African countries must tighten the policies to curb thus covid19.i Do not  see how you comparevus with Italy. .These people have good medical services;they are rich,while they can lockdown their countries;they can be able to supply services to them for a long time.And you want the gorvenment  to allow movements and spread it all over  tha country??? How many people in uganda have tapped water inside their compounds???How many can have food stores that can run for over 3months.I actually beg the gorvenment to be extra vigilant!!!Imagine if italy was Uganda;we would all be dead...why do you want people to move and spread the disease??? I HAVE HEARD EVEN PEOPLE OF CHURCHES SAYING TANZANIA ALLOWED PRAYERS IN CHURCHES?HAVEN'T  I HEARD YOU PASTORS PERFORMOPERFORMING MIRACLES OF RAISING THE DEAD,RAISING THE DEAD AND PRAYING THAT COVID19 GOES;WHICH IS EASY??? AND PLEASE ,PLEASE ...DO NOT GO LYING..MUSEVENI HAS NOT ORDERED TO SHOOT AT PEOPLE PRAYING IN THEIR HOMES,SO LONGER YOU DO IT IN ACCORDANCE TO DIRECTIVES;IT IS OK..BUT DO NOT CALL THE WHOLE VILLAGE IN YOU HOUSE???

Tuesday, April 14, 2020

These are the social media accounts where you get update news on covid19;Be aware of fake social media accounts

As i had earlier discovered -some malicious people are on a rampage of creating rogue social media acounts to spread rumours,malice our officials  and to seek dubious attention from public.
Here i present you screenshots ofvreal accounts where you can get true information.You can easily know a real account by looking at the followers;or individuals  whom the official follows;tweets or post he/she makes!!!





The above are twitter accounts that  can give you real information on covi19 here in uganda.



The above are the facebook accounts you can visit to get updates on covid19

As i earlier complained;some malicious people are using all means especially on social media to seek attention and create  tension and panick .For example someone used minister acheng's name and photo create an instgram account claiming that people can get updates and info from the account..but thank God that minister Acheng has made it clear that she does not have any instagram account.
Even the president's senior press secretary,Don wanyama has been a victim to this malice; where a tweet showed him presenting some information. ..but he also came out clear to show that it is fake.

I call upon UCC to dig deep into this issue and close some of these social media accounts that try to spread false information. .you know their phone numbers or you can trace their phone numbers and have them cleared off communication  networks. And UCC remember  and note it carefully  that there are many things not fully ok with some registeration of simcards..


For God and my country

one of the 2nd division vehicle hit by a stone thrown by malicious goons as they defied the presidential directives on the guard against the spread of covid19

Rouge and malicious  elements in kisoro have gotten to a vice of pelleting stones onto patrol vehicles meant to oversee how the directives are being followed by citzens.There are a series of such acts that have been done by a group of youth here in kisoro especially like setting a blaze the NRM office,the various incidents at that katimba market ,and others which  suspiciously had been engineered by some youth and other elements sponsored by some anti gorvenment groups and we know it very well that case like the setting  ablaze of the NRM office and some incident at katimba market were engineered by some bad elements inside kisoro,outside kisoro and accross  some of our border!The fact is that people in kisoro cannot independently plan and do some of such acts.
Lt.col Bataringaya the 35th battalion commander in Kisoro district said that the locals have resorted to stoning their patrol teams especially in the night hours as that on Monday last week a pick up belonging to Kisoro municipal council was stoned and it's windscreen broken, on Tuesday one of the Uganda peoples defense forces solidier while on patrol was injured on the head and that on Easter Sunday night his offical command vehicle registration number DO2DF103 was also stoned and windscreen broken.
"People have resorted on stoning our patrol teams especially during night hours On Monday last week a pick up belonging to Kisoro municipality was stoned smashing the wind screen On Tuesday one of our patrol soldiers was injured on the head Last night the my Command vehicle was stoned breaking the wind screen this must stop if not those doing it the outcome will not be good for them if they are caught we can't be intimidated we have to implement the presidents directives".said Lt.Col.Bataringaya.
Lt.Col. Bataringaya says that such acts of attacking the soildiers must stop as the out come of the attacks will not be good to them if the soildiers try to defend themselves.
Captain Peter Mugisha the Kisoro RDC says that there have been reports in areas of Russia in kisoro hill village kisoro municipality,Nyakabaya trading centre in Gasovu parish Nyarusiza sub country ,Gasenyi trading centre in Gasovu and at mubuga primary school where some youth were found playing football as when police tried to stop them they begun fighting the police officer in the process one was shot in the leg.
Captain Mugisha says this must stop as no amount of intimidation is going to stop them from enforcing the presidents directives .
Johnson Ahishakiye the Nyakinama sub county chief says that on Monday during an operation over 40 people were rounded up in bars as among them being teachers.
it is impressing that Ahishakiye has decided to actively fight these goons by sleeping at his work place-
"I have decided to respect the presidential directives of sleeping at our palces of work " said Ahishakiye.

M23 in Plans of massive attacks on Sake,Goma,Butembo and Bunia, and rumours all over DRC unconffirmingly have Uganda implicated in this act!

 They have been a lot of claims that M23 rebels are about to lay dangerous attacks on the city of Saké as well as the towns of Goma and Bute...