A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site
  • CRITICAL ALERT TO COMPUTER USERS

    Tanzania Communications Regulatory Authority is aware of number of reported incidents of widely spread computer malicious software named WannaCry Ransomware that infects computer files. The infection …

  • Ongoing use of Windows Vista, IE8 poses huge threats to Enterprises

    The Duo security company has released a report that highlights the high number of users still operating outdated Windows operating systems and unsupported browsers, “The 2016 Duo Trusted Access Report…

  • The National Child Helpline – 116

    C-Sema in 14th June 2013 launched a free telephone service available across all networks in United Republic of Tanzania that uses a short code 116. The service namely Child Helpline is for children in…

  • Yahoo Data Breach

    Yahoo has confirmed a data breach that might have involved around 500 million yahoo user accounts. Yahoo announced on 22nd September 2016 that in 2014, a cyber-attack believed to be state sponsored wh…

Current Activities

Wi-Fi Protected Access II (WPA2) Security Update

CERT/CC has released security update to address vulnerabilities in Wi-Fi Protected Access II (WPA2) protocol. Exploitation of these vulnerabilities may allow an attacker to take control of the affected system. Users and administrators are encouraged to review the CERT/CC Vulnerability Note and apply the necessary updates as they become available. …

Read More »

Adobe Security Updates

Adobe has released security update to address vulnerability in Flash Player for Windows, Macintosh, Linux and Chrome OS. Exploitation of this vulnerability may allow an attacker to take control of the affected system. Users and administrators are encouraged to review the Adobe Security Bulletin and apply the necessary updates. For …

Read More »

Microsoft Security Updates

Microsoft has released security updates to address identified vulnerabilities in Microsoft Office. Exploitation of these vulnerabilities could allow an attacker to take control of an affected system. Users and administrators are encouraged to review Microsoft Security advisories and apply the necessary updates. For more information visit: Microsoft Office Outlook Memory …

Read More »

Subscribe to Receive Regular Updates

sub2.fw

A digest of Tanzania Computer Incident Response Teams coverage of cybersecurity news across the globe