One of the cyber crime investigators creeds is that “no cyber criminal is too smart to leave no digital traces.” Smart thieves leave few traces. But there will always be something to link the crime to a suspect. And that is how a cyber-crime investigator established the name and mobile number of the suspect and gave the information to Uganda Police, who then obtained a court order for a call log printout from the telecom company. Together with the email header information, the physical location of the suspect’s office was established. With a search warrant, police visited the suspect’s offices…
Are you living for a cause or by a cause?
No one stays young forever. Every passing minute, you are growing old. Are you living for a cause or are you living by a cause? The young people today are breaking the hearts of their parents, slowly but consistently. Today, marks one day after burying one of the iconic and talented young musicians, popularly known by his stage name, Mowzey Radio. At just 33 years, Moses N. Ssekibogo had made a powerful brand. He graduated from Makerere University with a degree in Psychology, which gave him a strong foundation to succeed in his passion, music. He is a true success…
Of Free Internet and Big Brother’s Harvest
I read in the Daily Monitor of Thursday September 15, 2016 titled ‘Government to offer free Internet to Kampala, Entebbe’, with concern. Today, the National Information Technology Authority of Uganda, has announced that it will officially offer free Internet connectivity at the Kampala Capital City Carnival celebrations. This is a welcome development. Unfortunately, where are the terms of use? How will people’s privacy be protected from increasing threat of hackers in the city? The experience by Governments globally with technology giants like Apple, Facebook, Google and Microsoft which collect personal information is bad on their platforms is not so good. Their…
How to avoid being a cyber-crime victim, part 2
One of the cyber crime investigators creeds is that “no cyber criminal is too smart to leave no digital traces.” Smart thieves leave few traces. But there will always be something to link the crime to a suspect. And that is how a cyber-crime investigator established the name and mobile number of the suspect and gave the information to Uganda Police, who then obtained a court order for a call log printout from the telecom company. Together with the email header information, the physical location of the suspect’s office was established. With a search warrant, police visited the suspect’s offices…
How to avoid being a cyber-crime victim
Whether you access the Internet on your mobile phone, tablet or computer, you are exposed to cyber criminals. They are lurking on-line, searching for the next prey. From a technology perspective, there is no one who is 100% safe from a motivated cyber criminal. Technology changes so fast that what is tested and found as ‘water tight system’ today in terms of security (confidentiality, availability and integrity), will have an exploitable vulnerability the following day even before the system vendor discovers it, also called zero-day exploits. If that was not the case, there would be no new updates that are…
How to avoid being a cyber-crime victim
Whether you access the Internet on your mobile phone, tablet or computer, you are exposed to cyber criminals. They are lurking on-line, searching for the next prey. From a technology perspective, there is no one who is 100% safe from a motivated cybercriminal. Technology changes so fast that what is tested and found as ‘water tight system’ today in terms of security (confidentiality, availability and integrity), will have an exploitable vulnerability the following day even before the system vendor discovers it, also called zero-day exploits. If that was not the case, there would be no new updates that are always…