Search / Malware
Zimbabwe faces cyber threats
Over the past three years, Zimbabwe has witnessed a significant increase in organized cybercrime, characterized by a rise in online scams, business email compromises, and investment fraud, including m...Published: 07 Oct 2024 at 10:14hrs | 199 | by Staff reporter
Cyber crimes under-reported
Despite tireless efforts made by local, regional and global state and non-state actors to curb cybercrimes, statistics continues to spike because victims shun reporting these cases and therefore suffe...Published: 04 Oct 2024 at 12:14hrs | 291 | by Gideon Madzikatidze
Miss South Africa Contestant Faces Identity Theft Allegations and Online Abuse
A major scandal has erupted in South Africa after Miss South Africa contestant Chidimma Adetshina withdrew from the competition amid allegations of identity theft involving her mother. The ...Published: 21 Aug 2024 at 16:51hrs | 904 | by Staff Reporter
Zimbabwe escalates crime prevention, justice delivery
Home Affairs Permanent Secretary, Ambassador Raphael Faranisi, announced the revision of several laws and the introduction of new policies to enhance crime prevention and justice delivery in Zimbabwe....Published: 19 May 2024 at 10:21hrs | | by Staff reporter
WhatsApp Hack: How to read deleted messages
Often it's just an error but, at times, the italicised "This message has been deleted" can't help but pique a curious mind.It's hard to find any WhatsApp user who has yet to witness the messag...Published: 05 Feb 2023 at 08:51hrs | 16 | by Kyle Venktess
Fraudsters registering fake domains including for Zimbabwe passports
A fraudster has registered http://zimpassports.online to defraud Zimbabweans who are desperate for the elusive Zimbabwean passport.According to the website https://who.is, whoever registered t...Published: 21 May 2022 at 18:28hrs | 1 | by Jacob Mutisi
Nust students worry over lost results
STUDENTS at the National University of Science and Technology (NUST) have expressed concern over the removal of results from their student portals following a malware assault on the Nust system (Navis...Published: 16 Oct 2021 at 06:27hrs | 5 | by Staff reporter
Current digital banking trends in the US
Due to the pandemic, most industries across the globe have been forced to adapt and transform ways of doing business. Digitization has arguably been the most important tool for this, due to social dis...Published: 06 Oct 2021 at 12:23hrs | 11 | by Staff Writer
Businesses battle rising cyberattacks
ZIMBABWEAN businesses have increased investments towards enhancing cyber security to address vulnerabilities in the face of heightened cyberattacks following adoption of remote working spurred by the ...Published: 06 Sep 2021 at 06:50hrs | | by Staff reporter
'Zimbabweans careless online'
ICT experts in Zimbabwe say there is need to train workers and the general public on the dangers of Cyber-attacks as the Covid-19 pandemic has increased the need to work remotely. This has increased t...Published: 06 Sep 2021 at 05:20hrs | 1 | by Staff reporter
Pegasus spyware: No more privacy
IT is a well-known fact that countries spy on their citizens and also spy on other countries and their leaders.There is a new hacking software called Pegasus.This is a kind of spyware ...Published: 23 Jul 2021 at 08:50hrs | | by Mutisi
Mnangagwa govt bought Israel made spy software?
PRESIDENT Emmerson Mnangagwa's administration reportedly acquired the controversial mobile phone snooping equipment from Israeli surveillance company NSO Group, in 2019 for use by the Central Intellig...Published: 20 Jul 2021 at 08:33hrs | 2 | by Staff reporter
Mohadi is not the last, You can be the next to be hacked
There has been a lot of questions on how the former Vice President Cde Kembo Mohadi got his phone hacked and how the recordings were acquired. That can happen to anyone in these times of technology us...Published: 25 Mar 2021 at 10:17hrs | 7 | by Engineer Jacob Kudzayi Mutisi
How Africa lost billions to cyber criminals in 2020
A mobile payment cyber security specialist has lifted the lid on the business model underpinning the mobile fraud that cost the African continent over US$4 billion (R59,68 billion) last year.A...Published: 25 Mar 2021 at 05:54hrs | | by Staff reporter
PDFBear: Full Guide On the Quickest PDF to Word Converter Tool
Portable Document Format (PDF) files are an ideal and helpful file format to use. But the problem is, we can't modify anything in its content since it is tamper-proof. What to do? Convert your PDF fil...Published: 04 Jan 2021 at 14:26hrs | 9 | by Staff Reporter
Hard truths of external hard drive data backup
Hard drives are often trusted on for storing secondary copies of data. A hard disk drive fails when a hard disk drive breakdowns, and the stored data is unable to be retrieved with an appropriately co...Published: 24 Dec 2020 at 16:41hrs | 4 | by Staff Writer
4 reasons why all businesses need enterprise security software
In today's digital world, data security is one of the most controversial topics among business owners and consumers. The way business is done has completely changed as almost every existing company ha...Published: 07 Aug 2019 at 13:02hrs | 4 | by Staff Writer
New online trends
VR and AR have been on the headlines for a while. Voice shopping is expected to be one of the biggest trends in 2019. Everything that looked trendy in 2018 will either continue to trend in 2019 or exi...Published: 09 Apr 2019 at 14:21hrs | 1 | by Staff Writer
How to protect your family from hackers online
Cybercrime is at an all-time high in today's world, which can be highly dangerous for your personal information and the safety of your family. But there are things you can do to protect yourself and y...Published: 06 Dec 2018 at 11:16hrs | | by Staff Reporter
ZEC website susceptible to hacking
The security of Zimbabwe Election Commission (Zec) website, where prospective voters can check whether their names appear correctly on the voters' register, is under the spotlight, as the platform use...Published: 22 May 2018 at 14:05hrs | 1 | by Staff reporter
Cybersecurity 2018: what's working and what’s a worry
Every time a report on the state of cybersecurity is released, the world braces itself. After all, while the details have intermittently changed over the last few years, the overall message has remain...Published: 26 Apr 2018 at 14:21hrs | 2 | by Agencies
Biometric voter registration system: A technical synopsis
A LOT has been said by experts about the pros and cons of biometric voter registration (BVR).I do not intend here to offer a brief lecture about the BVR system that will be used to register el...Published: 14 Apr 2017 at 22:00hrs | 1 | by Robert Ndlovu
CIA's biggest spying secrets revealed by Wikileaks
WikiLeaks has released a huge set of files that it calls "Year Zero" and which mark the biggest exposure of CIA spying secrets ever.The massive set of documents - over 8,000 pages in all -...Published: 08 Mar 2017 at 13:13hrs | | by theindependent
Mugabe's death, Zimbabwe politicians ready themselves
To the casual observer, nothing much seems to have happened in Zimbabwe in recent years: Robert Mugabe, the world's oldest head of state, remains president and Zanu-PF is still the ruling party more t...Published: 13 Jun 2016 at 22:04hrs | | by Dr Stuart Doran
Gukurahundi: reckoning nears
TO the casual observer, nothing much seems to have happened in Zimbabwe of recent times. Robert Mugabe, the world's oldest head of state, remains president. And Zanu-PF is still the ruling party, more...Published: 19 May 2016 at 13:18hrs | | by Dr Stuart Doran
WhatsApp activates calling feature
Making phone calls using instant messaging service WhatsApp has quietly become a reality, albeit on an invite-only basis for Android users.Last year, WhatsApp announced plans to introduce...Published: 13 Mar 2015 at 12:17hrs | | by Sapa
Mugabe must be stopped from rigging from the red carpet
Unless civil society and opposition parties take immediate action to get to the bottom of the matter, Mugabe will forge ahead with the sham by-elections in March.I refer to the story " Zec mus...Published: 12 Feb 2015 at 09:22hrs | | by Clifford Chitupa Mashiri
North Korea responsible for 'destructive' cyber attack on Sony Pictures - FBI
Washington - North Korea was responsible for a "destructive" cyber attack on Sony Pictures, the US Federal Bureau of Investigation said Friday, warning it would hunt down the perpetrators and make the...Published: 19 Dec 2014 at 20:17hrs | | by AFP
Getting rid of nagging computer virus manually
Using a computer can be a total nightmare especially when one encounters the most nagging item, a virus. Computer viruses are self-replicating programs which cannot exist without a host. A computer v...Published: 03 Nov 2014 at 12:15hrs | 3 | by Noreen Sarai (Mrs)
How hackers are breaking into ATMs, stealing money - Video
Kaspersky Lab's experts recently performed a forensic investigation into cyber-criminal attacks targeting ATMs around the world.During the course of the investigation, the company's researche...Published: 08 Oct 2014 at 10:17hrs | 4 | by Staff reporter
Australian watchdog warns of Malaysia Airlines MH17 scams
Sydney - Australia's consumer watchdog has warned people to be wary of scams seeking to take advantage of the Malaysia Airlines MH17 tragedy, saying false Facebook profiles had already been set up....Published: 22 Jul 2014 at 09:07hrs | | by Staff Reporter
Internet surveillance sparks court war
LONDON - Internet service providers from around the world are lodging formal complaints against the UK government's monitoring service, GCHQ, alleging it uses malicious software to break into their ne...Published: 06 Jul 2014 at 06:38hrs | | by Staff Reporter
Zimbabwean company sue UK spooks over network spying
Mango from Zimbabwe and a coalition of ISPs and communication providers from around the world filed a legal complaint against the UK Government Communications Headquarters, calling for an end to its a...Published: 02 Jul 2014 at 19:51hrs | | by itworld
Hackers attack Apple
Hackers took a bite out of Apple security and virtually drove through Jeep's social media vehicle today, in the latest cyber attacks on major American companies.Intruders took over Jeep's Twit...Published: 19 Feb 2013 at 22:54hrs | 3 | by Tech Reporter
FBI disputes hacker group's claim
Washington - The FBI is disputing a computer hacker group's claim that it stole personal identification data on more than one million Apple device owners from an FBI agent's laptop.The FBI sa...Published: 05 Sep 2012 at 09:19hrs | | by Tech Reporter
Facebook makes effort to get rid of fake 'Likes'
San Francisco - Facebook ramped up efforts on Friday to get rid of "Likes" that aren't from people genuinely interested in giving a virtual thumbs up to pages at the world's leading social network....Published: 01 Sep 2012 at 13:48hrs | | by Staff reporter
Hackers targeting Macs with virus
San Francisco - The computer security industry buzzed with warnings that more than a half-million Macintosh computers may have been infected with a virus targeting Apple machines.Flashback Tro...Published: 08 Apr 2012 at 05:20hrs | | by Ndou Paul
Google launches 'Bouncer' service
Google has announced it's new security solution for Android codenamed 'Bouncer' which will be scanning existing and future apps in the Android Market."Here's how it works: Once an application ...Published: 06 Feb 2012 at 06:06hrs | | by Staff reporter
Final pre-test for the Iranian nuclear plant
Iran is conducting final tests at its first nuclear power plant and it is expected to start generating electricity in the next two months, Iranian media said on Monday. Meant to be the first ...Published: 09 May 2011 at 15:18hrs | | by Moyo Roy
Microsoft dismantle spam network
Microsoft on Thursday announced the dismantling of a "notorious and complex" network of virus-infected computers used to send billions of e-mail messages daily hawking fake drugs....Published: 18 Mar 2011 at 06:33hrs | | by Byo24News
Online banking hit by trojan, stealing people's money
A new Trojan dubbed "OddJob" is stealing people's money by taking over their online banking sessions after they think they've logged off.The Trojan, which targets Windows-based computers, is b...Published: 22 Feb 2011 at 23:26hrs | | by Byo24NEWS
Fifth of Facebook users exposed to malware
Security software manufacturer BitDefender today released some statistics gleaned from Safego, a Facebook application that it offers to users of the social-network to keep an eye on their vulnerabilit...Published: 25 Nov 2010 at 12:25hrs | | by Caroline McCarthy
Load More Stories