ZEC website hacked! What you should know

By Watmore Makokoba   When the Zimbabwe Electoral Commission Information leak scandal is still going rounds, ZEC breaks the silence and throws in a shocker, admits the election running institution’s website has been hacked!  This a website of a sole commission that runs elections in Zimbabwe and to take home the reality that the platform which […]

The post ZEC website hacked! What you should know appeared first on Kalabash Media.

Read more
Zimbabwe’s urgent need for data privacy laws

By Watmore Makokoba   The election campaign period has been an interesting period in Zimbabwe, a couple of incidences that happened namely leaking of personal data from the voters roll to some social media platforms and the  SMS campaign by Zanu PF using voters roll data made heads wage and placed a dent in the […]

The post Zimbabwe’s urgent need for data privacy laws appeared first on Kalabash Media.

Read more
Zimbabwe’s urgent need for data privacy laws

By Watmore Makokoba   The election campaign period has been an interesting period in Zimbabwe, a couple of incidences that happened namely leaking of personal data from the voters roll to some social media platforms and the  SMS campaign by Zanu PF using voters roll data made heads wage and placed a dent in the […]

The post Zimbabwe’s urgent need for data privacy laws appeared first on Kalabash Media.

Read more
How to protect your device from hackers

   By Watmore Makokoba   Smart-phones, laptop computers and desktop PCs are dear to peoples lives, however, malicious attackers can take over your device and use it to find out more about you, spy on you, or plant evidence.   Bellow is an explanation of the ways computers get taken over (or “pwned,” “0wned,” .), and how one can […]

The post How to protect your device from hackers appeared first on Kalabash Media.

Read more
Encryption: Here are the tools and practical guidelines

By Watmore Makokoba Encryption is the process of encoding data in such a way that only authorized parties can access them. The term can be described as asymmetric, end-to-end cryptography where only the sender and receivers of the messages can decrypt the messages or files and no third-party controls the cryptographic keys. Email Encryption Emails can be compared […]

The post Encryption: Here are the tools and practical guidelines appeared first on Kalabash Media.

Read more
Three key concepts you should know about Encryption

By Watmore Makokoba Basically, Encryption can be defined as the mathematical science of codes, ciphers, and secret messages. From time immemorial people have been using encryption to send messages to each other, that couldn’t be read by anyone besides the intended recipient. With the advent of technology, digital encryption technology has expanded beyond simple secret messages; encryption […]

The post Three key concepts you should know about Encryption appeared first on Kalabash Media.

Read more
#DataMustBeProtected: What we know about personal data protection in Zimbabwe

Do people have legislative provision for Personal Data Protection in Zimbabwe? below is what briefly the situation is like. By WatmoreMakokoba Amid revelations that people are receiving messages through SMS, Tweeter and social media which identifies their full names, name of the  voting constituency,  address or  even  more from contesting political parties particularly Zanu PF, It […]

The post #DataMustBeProtected: What we know about personal data protection in Zimbabwe appeared first on Kalabash Media.

Read more
Practical guide to protecting your identity on mobile phones

By Watmore Makokoba When your phone is on and communicating with the network towers, it can be used as a surveillance device and can transmit  information that telecoms collect, including: Your phone calls and SMS received and sent, including the information of senders and recipients. Any data services you use (e.g., web browsing activities if […]

The post Practical guide to protecting your identity on mobile phones appeared first on Kalabash Media.

Read more
How to secure your HTTP and IP on Twitter

  By Watmore Makokoba Although add-ons described above will force HTTPS for Twitter as well, it’s a good idea to change your Twitter settings to HTTPS by default whenever you connect, especially if you access Twitter on multiple or public computers. In order to enable HTTPS for Twitter, click on your Twitter handle in the […]

The post How to secure your HTTP and IP on Twitter appeared first on Kalabash Media.

Read more