Posts

Uganda Airlines Launches Mobile App

Image
  Uganda Airlines Launches Mobile App Sherry Karungi /  1 min 0 3 min read Share this article Facebook Twitter Email Print In the constantly evolving world of aviation, airlines are constantly seeking ways to improve the passenger experience. Uganda Airlines unveiled its state-of-the-art mobile app. This launch is more than just another app in the market; it’s a reflection of the airline’s commitment to providing an efficient, secure, and delightful experience for its customers. At the heart of this launch is the dedication to make life easier for travellers. The Uganda Airlines Mobile App, available for both iOS and Android smartphones, embodies convenience. It is meticulously designed to offer all Uganda Airlines flight information and customer service tools in a single, user-friendly interface. Whether you’re at home planning your next adventure or on the move, all you need is your smartphone to access the airline’s plethora of services. In the digital age, the safety of pe...

Uganda Electricity Transmission Company Ltd (ISO Certification)

Image
Uganda Electricity Transmission Company Ltd (UETCL) Achieves ISO Certification Milestone Nkwanzi Sheena /  1 min 0 2 min read Share this article Facebook Twitter Email Print The Uganda Electricity Transmission Company Ltd (UETCL) has achieved ISO 9001:2015 Quality Management System certification. The Minister of Energy, Dr. Ruth Nankabirwa Ssentamu, highlighted its strategic importance, emphasizing effective power utilization and plans to expand electricity transmission lines to neighboring countries. Minister of Energy, Dr Ruth Nankabirwa and the UETCL team With its prestigious ISO Certification, the Uganda Electricity Transmission Company Ltd (UETCL) has accomplished a significant milestone. The Minister of Energy and Mineral Development, Dr. Ruth Nankabirwa Ssentamu, presided over the ceremony, which was held at the Kampala Serena Hotel. The UETCL Board, management, personnel, and important stakeholders were notable guests. Dr. Nankabirwa highlighted effective power utilization ...

iPhone Hacking

Image
Hacking the iPhone has long been considered  a rarified endeavor , undertaken by sophisticated nation states  against  only their most high-value targets. But a discovery by a group of Google researchers has turned that notion on its head: For two years, someone has been using a rich collection of iPhone vulnerabilities with anything but restraint or careful targeting. Instead, they've indiscriminately hacked thousands of iPhones just by getting them to visit a website. On Thursday evening, Google's Project Zero security research team  revealed a broad campaign of iPhone hacking . A handful of websites in the wild had assembled five so-called exploit chains, tools that link together security vulnerabilities, allowing a hacker to penetrate each layer of iOS's digital protections. The rare and intricate chains of code exploited a total of 14 security flaws, targeting everything from the browser's "sandbox" isolation mechanism to the core of the operatin...

Israel Strike on Hamas Hackers

Image
violence between Israel and Gaza escalated to a degree not seen since 2014, with 25 Palestinians and four Israelis killed in the fighting. Decades into the entrenched tensions of the region, the incident overall was tragically unsurprising. But for cybersecurity professionals, one aspect particularly stood out: The Israeli Defense Force claimed that it bombed and partially destroyed one building in Gaza because it was allegedly the base of an active Hamas hacking group. The assault seems to be the first true example of a physical attack being used as a real-time response to digital aggression—another evolution of so-called "hybrid warfare." That makes it a landmark moment, but one that analysts caution must be viewed in the context of the conflict between Israel and Palestine, rather than as a standalone global harbinger. Lily Hay Newman is a WIRED staff writer focused on information security, digital privacy, and hacking. What Happened? This is a v...

Penetration Testing Tools for Hackers and Security Professionals

Network  Security & Penetration Testing Tools Scanning / Pentesting OpenVAS – OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution. Metasploit Framework – A tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research. Kali – Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. Kali Linux is preinstalled with numerous penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), and Aircrack-ng (a software suite for penetration-testing wireless LANs). pig – A Linux packet crafting tool. scapy – Scapy: the python-based interactive packet manipulation program & library. Pompem – Pompem is an open source tool, which...