Skip to main content

Posts

Ex-South Sudan VP Machar arrives in Juba for peace celebration.

Automated Publishing Via Osuta Yusuf Robot Trigger. Former first vice-president of South Sudan, Riek Machar has arrived in the capital Juba after fleeing two years ago, multiple media outlets have reported. Machar who leads the Sudan Peoples Liberation Movement In Opposition, SPLM-IO, is expected to join in peace celebrations later today. Along with president Salva Kiir, and other leaders from across the region, Machar will join the celebrations that are premised on a peace deal signed in September under the aegis of the regional bloc, IGAD and other international stakeholders. We are worried for his security in Juba, but the truth is here: we are for peace, and what we are trying to do is build trust. — Denis Dumo (DenisDumo)   Machar’s spokesperson, Lam Paul Gabriel confirmed that the former vice-president will return to Juba for the first time since he fled two years ago under a hail of gunfire when an earlier peace deal collapsed. “Machar will lead a delegation of the SPLM/A-IO mem

New iPhone Passcode Bypass Found Hours After Apple Releases iOS 12.1.

Automated Publishing Via Osuta Yusuf Robot Trigger. It's only been a few hours since Apple releases  iOS 12.1  and an iPhone enthusiast has managed to find a passcode bypass hack, once again, that could allow anyone to see all contacts' private information on a locked iPhone. Jose Rodriguez, a Spanish security researcher, contacted The Hacker News and confirmed that he discovered an iPhone passcode bypass bug in the latest version of its iOS mobile operating system, iOS 12.1, released by Apple today. To demonstrate the bug, Rodriguez shared a video with The Hacker News, as shown below, describing how the new iPhone hack works, which is relatively simple to perform than his previous passcode bypass findings. Instead, the issue resides in a new feature, called  Group FaceTime , introduced by Apple with iOS 12.1, which makes it easy for users to video chat with more people than ever before—maximum 32 people. How Does the New iPhone Passcode Bypass Attack Work? . Unlike his previou

IBM Buys `Red Hat` Open-Source Software Company for $34 Billion.

Automated Publishing Via Osuta Yusuf Robot Trigger. It's been quite a year for the open source platforms. Earlier this year, Microsoft acquired popular code repository hosting service GitHub for $7.5 billion, and now IBM has just announced the biggest open-source business deal ever. IBM today confirmed that it would be acquiring open source Linux firm  Red Hat  for $190 per share in cash, working out to a total value of approximately $34 billion. Red Hat, known for its Red Hat Enterprise Linux (RHEL) operating system, is a leading software company that offers open-source software products to the enterprise community. Even Oracle uses Red Hat’s source code for its Oracle Linux product. Red Hat's last year revenue was $2.4 billion, and this year the company has earned $2.9 billion. But if Red Hat products are open source and updates are free, you might be wondering how does the company earn. Red Hat was one of the first companies who found a successful way to make money from free

`5 Preventable Human Errors that Leave Your Company Vulnerable to a Cyberattack`

Automated Publishing Via Osuta Yusuf Robot Trigger. Business owners and Executive Management have a lot on their plate, including finding ways to protect their data and IT systems from hackers and scammers. Human errors take many forms and shapes and are often, at least partially, the source of accidental data breaches and successful cyberattacks. Here are five of the most common types of errors employees make and how companies can protect their users and IT systems.

LEAKED LIST INDICATES OVER 300000 GHOST REFUGEES RECRUITED BY GOVERNMENT OF UGANDA.

Inquiry finds refugee numbers were exaggerated by 300,000 in Uganda . Automated Publishing Via Osuta Yusuf Robot Trigger. Government investigation into alleged fraud and mismanaged funds confirms Uganda hosts 1.1 million refugees, not 1.4 million. Families queue for aid at a settlement in Palorinya. The country is home to one of the world’s largest refugee populations. A Ugandan government investigation into alleged fraud over refugee numbers has confirmed that previous figures were exaggerated by 300,000. An official inquiry, conducted since March by the office of the prime minister and the UN refugee agency, UNHCR, found that Uganda hosts 1.1 million refugees rather than 1.4 million. The investigation followed allegations that senior officials had inflated figures and mismanaged the funds meant to support them. Apollo Kazungu, commissioner for refugees in the prime minister’s office, and three of his senior staff – Walter Omondi, John Baptist Sentamu and Francis Nkwasibwe – were susp

Another Milestone Achieved: Run Linux Apps on a Chromebook.

Automated Publishing Via Osuta Yusuf Robot Trigger. Linux apps now can run in a Chromebook's Chrome OS environment. However, the process can be tricky, and it depends on your hardware's design and Google's whims. It is somewhat similar to running Android apps on your Chromebook, but the Linux connection is far less forgiving. If it works in your Chromebook's flavor, though, the computer becomes much more useful with more flexible options. Still, running Linux apps on a Chromebook will not replace the Chrome OS. The apps run in an isolated virtual machine without a Linux desktop. If you are not familiar with any Linux distribution, your only learning curve involves getting familiar with a new set of computing tools. That experience can pique interest in a full Linux setup on a non-Chromebook device. Why tool around with adding Linux apps to the Chromebook world? One reason is that now you can. That response may only suit Linux geeks and software devs looking to consolida

The Rise of Activist Employees in the Tech Industry. Hacker-Powered Security Report.

Automated Publishing Via Osuta Yusuf Robot Trigger. Hacker-Powered Security is any technique that utilizes the external hacker community to find unknown security vulnerabilities and reduce cyber risk. This report is the largest repository of hacker activity and vulnerability data on display. Get the Report. Things have been changing at an almost unprecedented rate with regard to power structures. The last time I saw this happen was in the 1970s, when the Equal Employment Opportunity Commission took off. Suddenly a lot of the off-color, sexist and racist jokes that many executives regularly told could get them fired. A surprisingly large number of people got reassigned, fired, demoted, or otherwise punished for the same behavior that previously had made them "one of the guys." With the current #MeToo movement, any hint of wrongdoing -- not only recent but going back to your youth -- can have dire consequences on job prospects, image, and (depending on what you did) freedom. Th