The Computer Society of Kenya

Since 1986

Cyber security – are we automating faster than we are protecting?

cybercrime2DAILY NATION By JOHN WALUBENGO

Tuesday February 19, 2019

Recently, the Director of Criminal Investigations (DCI) posted a list of one hundred and thirty most wanted cyber criminals in Kenya. Their key target being the financial sector, where insider sources confirm that fraudulent activity compromising digital platforms are at an all-time high.

Banks, insurers, SACCOs, State agencies, NGOs and anyone who has automated their processes has not been spared the rising scourge of being electronically raided and funds compromised.

It is no wonder the previously-common broad daylight robbery incidents against banks are long gone - having been adequately replaced by the white collar, highly-educated and skilled ''key-board'' robbers. Could this be a reflection of automating processes faster than we are developing capacity to protect them?

Read more...

Crypto-exchange CEO dies with password – time for tighter regulation?

moneyDAILY NATION By JOHN WALUBENGO

Tuesday February 12,2019

Recently, the CEO of a crypto exchange in Canada died, and with him went the crucial password that he had used to secure crypto assets of his customers on an offline storage device.

This event has brought to the fore the question of regulation with respect to these new forms of digital assets.

In traditional financial markets, customer funds are always protected through regulatory frameworks enforced by the Central Bank such that whenever banks collapse, for whatever reasons, the customer’s funds are recoverable.

Of course in the crypto-currency world as demonstrated by the bitcoin crypto, this regulatory or governance role is decentralised and distributed amongst peering nodes owned by anyone who is willing to download, install and run the bitcoin protocol.

Read more...

Terrorism has gone digital, so must Kenya's war on terror

NTSADAILY NATION By JOHN WALUBENGO

Tuesday January 22, 2019

Last week’s terrorist attack on the Dusit2 Hotel in Westlands and its quick containment by our security forces is commendable.

The subsequent arrests of suspects could not have happened swiftly if our security agencies were not up to speed with basic use of Information and Communication Technologies (ICTs) for investigative purposes.

Nairobi, like all other cities, is heavily digitised with cameras in public and private places.

Unless one travels in a hood or mask, it is very easy to work backwards from CCTV screen grabs of suspects at the scene of crime and trace back their movements over the last three to six months.

Read more...

DCI publishes list of 130 suspected bank hackers

cybercrime2DAILY NATION By PETER MBURU

Wednesday January 01, 2019

The Directorate of Criminal Investigations (DCI) on Wednesday published names and images of 130 suspects wanted in connection with electronic fraud by allegedly hacking bank systems. 

In a seven-page pullout published in local dailies on Wednesday, January 30, the DCI attached photographs of the suspects alongside their names and Identity card numbers, calling on the public to report their whereabouts to police.

The DCI also provided a list of phone numbers for members of the public to call or send message to if they spot the suspects. 

Police said they obtained court orders from Milimani and Kiambu Chief Magistrates’ courts to hunt down the suspects.

Read more...

Cyberattacks threaten elections and security, Kenyans say

cybercrime2DAILY NATION By VALENTINE OBARA

Monday January 14,2019

A majority of Kenyans are worried that cyberattacks will increase elections tampering and national security threats in future, according to a new survey.

A study carried out by American-based Pew Research Centre showed 73 percent of Kenyans believe that sensitive national security information will be leaked from cyberattacks, while 72 percent said such attacks are a recipe for election interference.

The research which was carried out in 26 countries globally, whose report was released over the weekend, also surveyed possibilities of cyberattacks on crucial public infrastructure such as power grids and telecommunication services.

Read more...

Share this page