ZEC website hacked! What you should know

By Watmore Makokoba   When the Zimbabwe Electoral Commission Information leak scandal is still going rounds, ZEC breaks the silence and throws in a shocker, admits the election running institution’s website has been hacked!  This a website of a sole commission that runs elections in Zimbabwe and to take home the reality that the platform which […]

The post ZEC website hacked! What you should know appeared first on Kalabash Media.

Read more
Zimbabwe’s urgent need for data privacy laws

By Watmore Makokoba   The election campaign period has been an interesting period in Zimbabwe, a couple of incidences that happened namely leaking of personal data from the voters roll to some social media platforms and the  SMS campaign by Zanu PF using voters roll data made heads wage and placed a dent in the […]

The post Zimbabwe’s urgent need for data privacy laws appeared first on Kalabash Media.

Read more
Zimbabwe’s urgent need for data privacy laws

By Watmore Makokoba   The election campaign period has been an interesting period in Zimbabwe, a couple of incidences that happened namely leaking of personal data from the voters roll to some social media platforms and the  SMS campaign by Zanu PF using voters roll data made heads wage and placed a dent in the […]

The post Zimbabwe’s urgent need for data privacy laws appeared first on Kalabash Media.

Read more
How do you keep your privacy online

By Watmore Makokoba   Virtual platforms have provided an efficient way of communicating and engagement, in this global village just like the physical world we live in has its own security shortcomings.   Internet users have to make sure their privacy is secured and their profiles are safe from information predators.   Below are some […]

The post How do you keep your privacy online appeared first on Kalabash Media.

Read more
How to protect your device from hackers

   By Watmore Makokoba   Smart-phones, laptop computers and desktop PCs are dear to peoples lives, however, malicious attackers can take over your device and use it to find out more about you, spy on you, or plant evidence.   Bellow is an explanation of the ways computers get taken over (or “pwned,” “0wned,” .), and how one can […]

The post How to protect your device from hackers appeared first on Kalabash Media.

Read more
Encryption: Here are the tools and practical guidelines

By Watmore Makokoba Encryption is the process of encoding data in such a way that only authorized parties can access them. The term can be described as asymmetric, end-to-end cryptography where only the sender and receivers of the messages can decrypt the messages or files and no third-party controls the cryptographic keys. Email Encryption Emails can be compared […]

The post Encryption: Here are the tools and practical guidelines appeared first on Kalabash Media.

Read more
Three key concepts you should know about Encryption

By Watmore Makokoba Basically, Encryption can be defined as the mathematical science of codes, ciphers, and secret messages. From time immemorial people have been using encryption to send messages to each other, that couldn’t be read by anyone besides the intended recipient. With the advent of technology, digital encryption technology has expanded beyond simple secret messages; encryption […]

The post Three key concepts you should know about Encryption appeared first on Kalabash Media.

Read more
What you should know about National Digital Identity

By Watmore Makokoba People’s identity and documentation of data about them are critical for government planning, development and security. Cutesy of technology, digitalised collection, processing and storage of data is now spontaneous and smooth. Soothing, is it? but wait…… Governments have grown to be known as not trustworthy in protecting the confidentiality of the sensitive […]

The post What you should know about National Digital Identity appeared first on Kalabash Media.

Read more
Voter registration data leak: Who is to blame?

By Watmore Makokoba Last week incident where the ruling party a  campaign by sending messages direct messages believed to be information from the voters roll is a violation of personal data protection regulations. This voter registration data leak revealed how personal information security and the right to privacy is not guaranteed in Zimbabwe. It is more than […]

The post Voter registration data leak: Who is to blame? appeared first on Kalabash Media.

Read more