A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site
  • CRITICAL ALERT TO COMPUTER USERS

    Tanzania Communications Regulatory Authority is aware of number of reported incidents of widely spread computer malicious software named WannaCry Ransomware that infects computer files. The infection …

  • Ongoing use of Windows Vista, IE8 poses huge threats to Enterprises

    The Duo security company has released a report that highlights the high number of users still operating outdated Windows operating systems and unsupported browsers, “The 2016 Duo Trusted Access Report…

  • The National Child Helpline – 116

    C-Sema in 14th June 2013 launched a free telephone service available across all networks in United Republic of Tanzania that uses a short code 116. The service namely Child Helpline is for children in…

  • Yahoo Data Breach

    Yahoo has confirmed a data breach that might have involved around 500 million yahoo user accounts. Yahoo announced on 22nd September 2016 that in 2014, a cyber-attack believed to be state sponsored wh…

Current Activities

Security Updates for Firefox and Firefox ESR

The Mozilla Foundation has release security update to address vulnerabilities in Firefox and Firefox ESR. Exploitation of these vulnerabilities can allow an attacker to take control of an affected system. Users and administrators are encouraged to review the released Security Advisory and apply necessary updates. For more information please review …

Read More »

Microsoft Security Updates for Malware Protection Engine

Microsoft has released a security updates to address vulnerability in its Malware Protection Engine. Exploitation of this vulnerability can allow an attacker to take control of an affected system. Users and administrators are encouraged to review the Advisory and apply necessary updates. For more information visit Microsoft Security Advisory

Read More »

Apple Releases Security Updates

Apple has released a security updates to address vulnerabilities in its multiple products. Exploitation of these vulnerabilities may allow an attacker to take control of an affected system. Users and administrators are encouraged to review the released updates and take necessary actions. For more information, visit below listed webpages: iOS …

Read More »

Subscribe to Receive Regular Updates

sub2.fw

A digest of Tanzania Computer Incident Response Teams coverage of cybersecurity news across the globe