ZEC website hacked! What you should know

By Watmore Makokoba   When the Zimbabwe Electoral Commission Information leak scandal is still going rounds, ZEC breaks the silence and throws in a shocker, admits the election running institution’s website has been hacked!  This a website of a sole commission that runs elections in Zimbabwe and to take home the reality that the platform which […]

The post ZEC website hacked! What you should know appeared first on Kalabash Media.

Read more
Zimbabwe’s urgent need for data privacy laws

By Watmore Makokoba   The election campaign period has been an interesting period in Zimbabwe, a couple of incidences that happened namely leaking of personal data from the voters roll to some social media platforms and the  SMS campaign by Zanu PF using voters roll data made heads wage and placed a dent in the […]

The post Zimbabwe’s urgent need for data privacy laws appeared first on Kalabash Media.

Read more
Zimbabwe’s urgent need for data privacy laws

By Watmore Makokoba   The election campaign period has been an interesting period in Zimbabwe, a couple of incidences that happened namely leaking of personal data from the voters roll to some social media platforms and the  SMS campaign by Zanu PF using voters roll data made heads wage and placed a dent in the […]

The post Zimbabwe’s urgent need for data privacy laws appeared first on Kalabash Media.

Read more
How do you keep your privacy online

By Watmore Makokoba   Virtual platforms have provided an efficient way of communicating and engagement, in this global village just like the physical world we live in has its own security shortcomings.   Internet users have to make sure their privacy is secured and their profiles are safe from information predators.   Below are some […]

The post How do you keep your privacy online appeared first on Kalabash Media.

Read more
Encryption: Here are the tools and practical guidelines

By Watmore Makokoba Encryption is the process of encoding data in such a way that only authorized parties can access them. The term can be described as asymmetric, end-to-end cryptography where only the sender and receivers of the messages can decrypt the messages or files and no third-party controls the cryptographic keys. Email Encryption Emails can be compared […]

The post Encryption: Here are the tools and practical guidelines appeared first on Kalabash Media.

Read more
Practical guide to protecting your identity on mobile phones

By Watmore Makokoba When your phone is on and communicating with the network towers, it can be used as a surveillance device and can transmit  information that telecoms collect, including: Your phone calls and SMS received and sent, including the information of senders and recipients. Any data services you use (e.g., web browsing activities if […]

The post Practical guide to protecting your identity on mobile phones appeared first on Kalabash Media.

Read more
How to secure your mobile phone from spyware

By Watmore Makokoba Globally, activists, journalists, politicians and government critics have been tracked via their mobile phones, and some countries in Africa conduct surveillance more extensively than others with risks varying from country to country. According to Accessnow, people such as human rights defenders are experiencing a high level of surveillance in some parts of […]

The post How to secure your mobile phone from spyware appeared first on Kalabash Media.

Read more