A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site
  • CRITICAL ALERT TO COMPUTER USERS

    Tanzania Communications Regulatory Authority is aware of number of reported incidents of widely spread computer malicious software named WannaCry Ransomware that infects computer files. The infection …

  • Ongoing use of Windows Vista, IE8 poses huge threats to Enterprises

    The Duo security company has released a report that highlights the high number of users still operating outdated Windows operating systems and unsupported browsers, “The 2016 Duo Trusted Access Report…

  • The National Child Helpline – 116

    C-Sema in 14th June 2013 launched a free telephone service available across all networks in United Republic of Tanzania that uses a short code 116. The service namely Child Helpline is for children in…

  • Yahoo Data Breach

    Yahoo has confirmed a data breach that might have involved around 500 million yahoo user accounts. Yahoo announced on 22nd September 2016 that in 2014, a cyber-attack believed to be state sponsored wh…

Current Activities

Microsoft Security Updates

Microsoft has released security updates to address vulnerabilities to its multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of affected system. Users and administrators are encouraged to review Microsoft Security Bulletins and apply necessary updates by clicking Release Notes and Security Update Summary.

Read More »

VMware Security Updates

VMware has released security updates to address remote code execution vulnerability in VMware AirWatch Agent for Android and Windows Mobile devices. Exploitation of this vulnerability may allow unauthorized creation and execution of files in the Agent sandbox and other publicly accessible directories. Users and Administrators are encouraged to review VMware …

Read More »

Android Security Updates

Google has released security updates to address multiple vulnerabilities in its Android OS.  Exploitation of these vulnerabilities may allow execution of arbitrary code within the context of a privileged process. Users and administrators are encouraged to review Android Security Bulletin and apply necessary updates.

Read More »

Subscribe to Receive Regular Updates

sub2.fw

A digest of Tanzania Computer Incident Response Teams coverage of cybersecurity news across the globe