Home » IT News » Page 288

IT News

Understanding African Markets During COVID-19

Sourced from iStock. We are living in unprecedented times. COVID-19 has swept throughout the world, and governments globally have taken drastic measures to stop the spread in an attempt to save lives. In February 2020, as African countries watched Asia and Europe begin the implementation of lockdown, a study by Survey54, an automated mobile-led data collection platform, found that approximately 80% of Africans interviewed felt almost immune to the virus as they were yet to hear of any confirmed cases on the continent. This did not last long and by Mid-March, lockdown procedures were initiated across Africa. Despite the swift response, lockdown came with many challenges that drastically affected a continent which heavily depends on the informal sector. With roughly 90% of Africans now conce...

Vodacom is The First Telco to Zero-Rate what3words

The what3words technology, available as an app or online map, has divided the world into a grid of 3m squares, giving each square a unique combination of three words: a what3words address. Vodacom has become the first telco globally to zero-rate the lifesaving addressing technology, what3words, for its more than 43 million subscribers across South Africa. The UN estimates that 75% of countries in the world have a poorly maintained addressing system – or none at all. This is an issue that South Africa knows well, with large parts of the country still lacking spatial planning. This might be an inconvenience when you are expecting a delivery, but it is a far graver issue for locals living in rural areas or informal settlements when it comes to emergencies. Without an address – or in the event...

Trump Threatens Twitter and Other Social Media Platforms After Being Fact-Checked

Sourced from Politico. US President Donald Trump has threatened to regulate or even “close down” social media platforms in a series of tweets over the last day on Twitter. This comes after Twitter added a fact-check label to some of his posts. The labels entail that particular tweets contained misleading information. The president (ironically) tweeted that republicans feel that social media platforms such as Twitter are trying to censor their political views. ….happen again. Just like we can’t let large scale Mail-In Ballots take root in our Country. It would be a free for all on cheating, forgery and the theft of Ballots. Whoever cheated the most would win. Likewise, Social Media. Clean up your act, NOW!!!! — Donald J. Trump (@realDonaldTrump) May 27, 2020 He then warned, “Big action [is]...

Cashless and Contactless Payments Beyond COVID-19

The emergence of COVID-19 has made the need for digitising payments more critical than ever before and for this to be a success, electronic payments need to offer similar benefits to those afforded by cash. Globally, economies are in various stages of development having either started developing, replaced or are busy replacing daily batch payment systems with real-time systems that execute payments in seconds with the flexibility to meet the needs of the future digital economy. The drive towards digital payments and lowering the reliance on cash is not new to South Africa’s payments market. There are several mechanisms already in place to enable this and banks, card companies, fintechs and retailers are all involved in rolling out digital, non-touch payment mechanisms. Contactless cards us...

Use of Cloud Collaboration Tools Surge Across the World and So Do Attacks

The COVID-19 pandemic has pushed companies to adapt to new government-mandated restrictions on workforce movement around the world. The immediate response has been a rapid adoption and integration of cloud services, particularly cloud-based tools such as Microsoft Office 365, Slack and other video conferencing platforms like Zoom. A new report by security firm McAfee shows that hackers are responding to this mass migration to these platforms with an increased focus on abusing cloud account credentials. After analyzing cloud usage data that was collected between January and April, from over 30-million enterprise users of its MVISION cloud security monitoring platform, the company estimates a 50% growth in adoption of cloud services across all industries. Some industries, however, saw a much...

Entersekt Integrates Digital Banking Software with Huawei Mobile Services

Sourced from Getty Images. Mobile fintech solutions company, Entersekt announced that it has successfully integrated with Huawei Mobile Services (HMS). HMS is Huawei’s alternative to Google Mobile Services, a collection of applications and application programming interfaces that are typically pre-installed on Android phones and tablets. Entersekt fast-tracked work on its mobile software development kit (SDK) to facilitate push messaging and ensure that consumers could continue to bank and transact securely after upgrading to newly manufactured Huawei mobile devices. The fintech provider holds an 80 per cent share of the South African digital banking authentication market and counts major overseas banks as customers too. The updated SDK is now ready for release to app developers across the ...

Twitter Labels President Trump’s “Potentially Misleading” Tweets

Image sourced from Al Jazeera Twitter said Tuesday that it added a label to the United States (US) President Donald Trump’s tweets for containing “potentially misleading information about voting processes,” a rare move that shows the social media company is taking a tougher stance against misinformation. Twitter reserves these labels for tweets that contain information flagged by the website as false. It’s the first time that Twitter has displayed such a label on one of Trump’s tweets. That same Tuesday, Trump tweeted “There is NO WAY (ZERO!) that Mail-in-Ballots will be anything less than substantially fraudulent,” a claim that has been debunked by fact-checkers and news organizations. He continues his remarks in another tweet, stating that it will be a “rigged election.” Mail-in-Ballots ...

7 Techniques Cybercriminals Could Use to Steal Your Private Data

Cyber threats do not rest and they continue to evolve as bad actors develop new attack techniques. Good cybersecurity hygiene requires more than a strong password to avoid compromise. The most important thing is to know how exactly cybercriminals may attempt to gain access to your data. Here are seven techniques they might try: Password Spraying: A form of brute force attack that targets multiple accounts in which adversaries try multiple guesses of the password on a single account that often leads to account lockout. With password spraying, the adversary only tries a few of the most common passwords against multiple user accounts, trying to identify that one person who is using a default or easy-to-guess password and thus avoiding the account lockout scenario. Key logging attack: By insta...

Enterprise Data Storage ‘business as usual’ with Tintri and Networks Unlimited

As the world grapples with a totally different business dynamic in the wake of the global lockdowns currently in place, the enterprise storage industry must continue showcasing the continuous innovation that enables compelling solutions for its clients. This, however, is not so easy for all players in the current economic downturn. This is according to a recent blog entry by Tintri, which provides AI-enabled intelligent infrastructure, and partners in South Africa with value-added distributor Networks Unlimited Africa. According to the blog, “Innovation and continuous investment therein are key drivers that enable compelling solutions to reach customers’ data centres. But in these extraordinary times business cannot operate as usual, and some vendors are finding their ability to maintain c...

Cybersecurity Reimagined for the CIO

Sourced from International IDEA Despite the technological innovation taking place, companies would do well to remain focused on ensuring their IT fundamentals are in place before rushing to capitalise on the latest trends. And nowhere is this more critical than when it comes to cybersecurity. Expectations are that the impact of global cybercrime will cost businesses more than $6 trillion by the end of next year, up from $3 trillion in 2015. It, therefore, remains one of the most significant challenges as digital transformation continues to grow in momentum, and the cloud has become part of standard business operations. Fortunately, companies are taking the protection of their data and networks seriously. Worldwide spending on information security solutions is anticipated to grow at a five-...

Check Point Software Partners Strathmore University to Promote Digital Skills in Kenya

Sourced from Business News Daily Cybersecurity solutions company, Check Point Software has announced that its education initiative has partnered with Strathmore University in Kenya to provide a comprehensive cybersecurity curriculum to students, bridging the digital skills gap and also creating a safer local cyber landscape. According to research, the number of unfilled cybersecurity roles now stands at 4.07 million professionals globally. What causes alarm for those within the security market across Africa is that the ICT courses across a range of disciplines are still underdeveloped, as well as the skills required to operate, support and understand the complexities of next-generation technologies and threats. Introducing the Check Point SecureAcademy  To keep up with the current thr...

Spotify Removes its 10,000-Song Library Limit

Sourced from Forbes. Spotify has finally removed its 10,000-song cap on library sizes, now allowing users to add as much music as they’d like to their personal libraries. Fixing an issue that has irritated music-lovers on the service for years. With more than 50-million songs available to customers to stream at any time, until today, there was a hard limit of 10,000 songs that users could save to their own “Your Music” collections on Spotify for easy access. This is no more. After today, you can add as many songs as you like to your Liked Songs on @Spotify I’ve been working with a small team on the refactoring necessary to pull this off for a while now. Very happy to see this finally out. https://t.co/1nSExF5o3V — Felipe O. Carvalho (@_Felipe) May 26, 2020 Users have been requesting ...