The Rational Writer: Tech&Internet: 20 Ways of Gaining Genuine Twitter Followers 1newkenya.blogspot.com
Friday, November 18, 2016
Wednesday, November 2, 2016
Tuesday, November 1, 2016
Leaked Whatsapp: Woman Begs bae’s best friend for s3x
What are women turning into in this 21st century? Can’t they just can’t stick to one partner? Or is it some unexplained evolution – not to be mistaken for ovulation?
A quick perusal at a dictionary defines loyalty as being faithful or devoted to someone or something. It can also be taken to mean “having somebody’s back.” But if what is happening these days is anything to go by, women are generally turning into the exact opposite of the word.
PHOTOS: Meet Kenya’s hottest female AP officer
If they’re not hanging around clubs in search of sponsors, while you are out there toiling to give them the best, they’re busy hunting for your buddies.
“Who run the world, girls…” Pop diva Beyonce once sang. And for sure they do. They’ve been doing it since the days of Garden of Eden.
With that said, a feeling I believe is backed by thousands of men out there, if not millions, a story is spreading faster than bush fire of a Kenyan woman whose WhatsApp chats between her and a neighbour leaked.
READ: Rachel Shebesh encounter with beggar that turned embarrassing
In the conversation, the woman is begging the man – who also happens to be her lover’s friend – to go to her house for a quickie. The excuse? She is very horny and needs some pounding.
According to her, her bae had gone to church and that she was about to explode with bodily needs. She also told the man all she needed was just “one shot’.
But it doesn’t end there, Devlina also sends a steamy nude photo just to drive her point home. Naturally, the man seems reluctant at first but quickly succumbs to temptations.
Saturday, October 29, 2016
Facebook CEO Mark Zuckerberg To Introduce A Dislike Button in FACEBOOK
Facebook
CEO Mark Zuckerberg recently announced that the company is finally
working on a much-desired feature: a “dislike” button. According to
Zuckerberg, this feature has long been one of those most-requested by
the Facebook audience.
Facebook, pressed for years by users to add a “dislike” button, says it is working on the feature and will be testing it soon.
“We’ve
finally heard you,” CEO and founder Mark Zuckerberg told a public town
hall meeting in Facebook’s hometown of Menlo Park, California.
A
question submitted online by a user asked the oft-repeated question of
why there were no buttons along the lines of “I’m sorry”, “interesting”
or “dislike” in addition to the classic thumbs-up “like” button, through
which users show their support for posts from friends, stars and brands
on the social network.
“Probably
hundreds of people have asked about this, and today is a special day
because today is the day where I actually get to say we are working on
it and are very close to shipping a test of it,” Zuckerberg said.
“It
took us a while to get here, because we do not want to turn Facebook
into a forum where people are voting up or down on people’s posts. That
does not seem like the kind of community that we want to create.”
He
said he understood that it was awkward to click “like” on a post about
events such as a death in the family or the current refugee crisis and
that there should be a better way for users to “express that they
understand and that they relate to you.”
“We have been working on this for a while, actually. “It is surprisingly complicated to make,” Zuckerberg added.
“But
we have an idea that we think we are getting ready to test soon, and
depending on how that goes, we will roll it out more broadly.”
Tuesday, October 25, 2016
ENTREPRENEUR WATCH..ONE OF THE SIMPLEST BEST WAYS TO START EARNING WHILE YOUNG.
SIMPLE BUSINESS IDEAS FOR YOUNG ENTREPRENEURS
1. CHIMNEY SWEEP
Learning to be a chimney sweep may mean nothing more than apprenticing with someone already in the business. By becoming a chimney expert, you can combine a chimney sweep business with a chimney inspection service--covering more than just whether or not the chimney needs cleaning but whether the chimney is in good working order or in need of repair.2. CLEANING SERVICE
There are many directions you can take this business. If you want to work during hours when no one else does, you can focus on office clients. You can focus on retail businesses and keep your customers clumped into one or two blocks. Restaurants are in great need of daily thorough cleaning and can be a great source of steady clients. Perhaps you would be more interested in house cleaning. Many times with cleaning services you don't have to spend lots of money on advertising or marketing because your customers will come by word of mouth.Monday, October 24, 2016
Meru MCAs claim they were conned Sh5m during State House visit
Meru MCAs claim they were conned Sh5m during State House visit
26115 Views
Members of the Meru County Assembly claim they were swindled Sh5 million handed to them during their Friday meeting with President Uhuru Kenyatta at State House, Nairobi.An unnamed member of the delegation is said to have pocketed the amount.
A section of the MCAs, who spoke to Nairobi News after the meeting, claimed they were told President Kenyatta gave them Sh5.5 million to share among themselves for fuel and accommodation.
The MCAs were however just given about Sh500,000 to share among themselves, with the unnamed member allegedly pocketing the other Sh5 million.
Although the MCAs refused to be quoted, they said they ended up with between Sh 6,000 and Sh7,000 each for accommodation and transport.
“After the meeting we inquired if we could be refunded the money we had spent. Unfortunately we noted that some MPs had already signed for the same and left.
“We went to witness the signing of a bill into law that will help Meru people and that was exactly what we did. The rest is not very important and could be handled later,” he added.
Meru ICT County Executive Martin Bikuri posted was the first to make the claims that the MCAs had been conned Sh5 million.
“Meru MPs go to State House and leave devolution conference going on tith over 5000 visitors in Meru. They are given Sh5.5m and mwagi thoni (Kimeru for uncouth person) with all his ill-gotten wealth runs away with 5m,” Mr Bikuri claimed.
Igoji West ward representative Kaumbuthu Chabari, who attended the State House meeting, disputed the claims terming them as propaganda from people who were out to tarnish the leaders’ names.
“I was among the last to leave State house yet I never heard about any sh5 million. There are individuals who tried to bring out ‘KIKALI’ outfit versus Governor Peter Munya politics, but we agreed this was not a political meeting. I understand some people had met Mr Raila Odinga the previous night and hatched some propaganda to tarnish names,” Mr Chabari said.
KIKALI is a political outfit that brings together Senator Kiraitu Murungi, woman representative Florence Kajuju and Igembe South MP Mithika Linturi who have expressed interest for the Meru gubernatorial, woman representative and senatorial seats respectively in 2017 polls.
Mr Murungi led MPs and MCAs from the county in the visit to State House on Friday to witness the signing of a bill that recognizes miraa as a cash crop.
Friday, October 21, 2016
HACKERS STEALING MORE MONEY THAN POLITICIANS.....HOW TO AVOID HACKS BY IT PROFFESSIONALS
KCB Bank, one of Kenya's
largest banks by customer numbers, appears to have suffered a massive
data breach as a file with the details of more than 500,000 customers,
including their names and phone numbers appeared online.
The information was brought to light by Burundian hacker Chris Irakoze, who first mentioned the data breach in September.
Chris explains that the data was collected from an 'information leakage vulnerability', where a flaw in the KCB app gave him access through a Python injection to sensitive data, including the technical details of the Web application, environment, or specific data of the user.
The data includes the names and numbers of KCB customers
These revelations come as KCB customers report unsolicited text messages reportedly coming from the bank offering loans at low interest rates.
While the bank has taken steps to alert customers about potential fraud through the text messages, this vulnerability could explain how the customer data was obtained in the first place.
Chris discovered the flaw while looking for vulnerabilities in another KCB service, known as KCB Iwacu, which the bank rolled out in Burundi and Rwanda.
KCB Iwacu is similar to KCB Mtaani, a service that enables customers to deposit or withdraw money from an agent using their phones. The customer would initiate a transaction through the KCB app or via USSD, after which a transfer is made to the agent's account. After receiving a confirmation message from KCB and gives you money.
The vulnerability, Chris explains, lies in the fact that the agent receives confirmation by SMS. Anyone can spoof a text message and change the number of the sender. A hacker could then steal the money using only the phone number and the name of the agent. KCB's agency banking services use Point-Of-Sale machines, which make the attack more difficult but not impossible.
Chris checked the KCB app, and found that while it has all the necessary security features to protect user data transmitted over the network, but misusing them allowed a man in the middle attack which would have allowed a hacker to take complete control of user account.
The KCB app is no longer available in Burundi, but different versions of the app are in use in Kenya and Rwanda.
Following this discovery, Chris reportedly reached out to KCB, alerting them to the flaw in their system. Under Kenya's proposed Data Protection Act of 2012, anyone collecting sensitive data from the public must put in place appropriate technical and organizational measures to safeguard the data against the risk of loss, damage, destruction of or unauthorized access to personal information.
Chris has detailed how he was able to find the information via the flaw in the KCB app, and how he and his team wrote a Python script to extract the data in a blog post.
UPDATE: KCB Bank has issued a statement in response to the revelations from this article:
The information was brought to light by Burundian hacker Chris Irakoze, who first mentioned the data breach in September.
Chris explains that the data was collected from an 'information leakage vulnerability', where a flaw in the KCB app gave him access through a Python injection to sensitive data, including the technical details of the Web application, environment, or specific data of the user.
In our case the KCB leaked the numbers and names of their customers. One of the things that a hacker can do would be to sell those phone numbers. There are plenty of people who would pay for personal numbers. A hacker could also sell the information to a competing bank. A scam or phishing attack type which would allow to target customers of KCB. In the best case, you will have spam, and in the worse you will lose your money. I wonder if it hasn’t already started.Chris IrakozeChris explains that he was able to do a reverse search comparing all possible phone numbers from 254 700 000 to 254 799 999 with the data obtained through the app's vulnerability. If a number belongs to a KCB customer, the search would reveal the person's name from the database. The whole process took slightly less than two months.
The data includes the names and numbers of KCB customers
These revelations come as KCB customers report unsolicited text messages reportedly coming from the bank offering loans at low interest rates.
While the bank has taken steps to alert customers about potential fraud through the text messages, this vulnerability could explain how the customer data was obtained in the first place.
Chris discovered the flaw while looking for vulnerabilities in another KCB service, known as KCB Iwacu, which the bank rolled out in Burundi and Rwanda.
KCB Iwacu is similar to KCB Mtaani, a service that enables customers to deposit or withdraw money from an agent using their phones. The customer would initiate a transaction through the KCB app or via USSD, after which a transfer is made to the agent's account. After receiving a confirmation message from KCB and gives you money.
The vulnerability, Chris explains, lies in the fact that the agent receives confirmation by SMS. Anyone can spoof a text message and change the number of the sender. A hacker could then steal the money using only the phone number and the name of the agent. KCB's agency banking services use Point-Of-Sale machines, which make the attack more difficult but not impossible.
Chris checked the KCB app, and found that while it has all the necessary security features to protect user data transmitted over the network, but misusing them allowed a man in the middle attack which would have allowed a hacker to take complete control of user account.
The KCB app is no longer available in Burundi, but different versions of the app are in use in Kenya and Rwanda.
Following this discovery, Chris reportedly reached out to KCB, alerting them to the flaw in their system. Under Kenya's proposed Data Protection Act of 2012, anyone collecting sensitive data from the public must put in place appropriate technical and organizational measures to safeguard the data against the risk of loss, damage, destruction of or unauthorized access to personal information.
An agency that holds personal information shall ensure that the information is protected, by such security safeguards as are reasonable in the circumstances against loss, damage and destruction; and access and use by an unauthorised person, modification, or negligent disclosure or use The Data Protection Bill, 2012When contacted for comment, KCB responded that they were aware of the claims of a data breach, and all customer data and platforms were safe.
Chris has detailed how he was able to find the information via the flaw in the KCB app, and how he and his team wrote a Python script to extract the data in a blog post.
UPDATE: KCB Bank has issued a statement in response to the revelations from this article:
We wish to assure all our customers that our platforms and data are highly secured. KCB Group systems including the mobile App have been extensively tested and validated by our internal and the best external data security experts. Multiple layers of encryption, private keys and unique authentication are among the key embedded data security features that safeguard our mobile app.
There is no breach to our systems.KCB Bank Kenya
Subscribe to:
Posts (Atom)
Comments