Egypt passes law to monitor and regulate social media

Egypt's parliament has approved and passed a bill that will see social media accounts with more than 5,000 followers regulated and treated like media outlets. The main reason behind the law is to monitor and regulate social media accounts that allegedly create, publish and distribute fake news. The social…

Read More

Joshua Miltz explains how BitFund works

Investing in cryptocurrencies is not for the faint-hearted. This is especially true when you look at how well the top 20 or so cryptocurrencies performed in 2017 compared to how they are performing so far in 2018. Having said that, a newly launched diversified cryptocurrencies investment platform in South Africa,…

Read More

South Africa's Presidency website defaced by Black TeamX

Earlier on Saturday, 7 July 2018, the website of "The Presidency of the Republic of South Africa" was defaced by a group calling themselves the "Black TeamX." When contacted, The Presidency's spokesperson, Khusela Diko, confirmed that there had been "interference" with the website. "HACKED BY BLACK TEAMX. SAHARA IS MOROCCAN…

Read More

Central Bank of Nigeria's guidelines on cyber security risks

The Central Bank of Nigeria (CBN) has issued a letter and a draft document outlining how financial institutions in the West Afrikan country should deal with cyber security related risks. The main reason it has issued the draft "risk-based cyber-security framework", CBN explains, is because of the recent inrease in…

Read More

Social media tax is now active in Uganda

Uganda's much-debated social media (OTT) tax has officially gone live. From 1 July 2018, Ugandans were required to pay the tax if they wanted to access services such as Facebook, Twitter, WhatsApp, and many others. The social media tax was initially proposed in April 2018 in an announcement in which…

Read More

Alleged Liberty Group hackers make public statement

Barely a couple of hours after David Munro, Chief Executive at Liberty Group, held a media briefing and answered questions relating to the breach of their IT infrastructure, a person/s claiming to have been responsible for the breach have made a public statement. The statement, posted publicly and seen…

Read More