A huge collection of 3400+ free website templates JAR theme com WP themes and more at the biggest community-driven free web design site
Home / news

news

CyberStarsTz2020: Tanzania’s Most Challenging Competition is BACK

https://cyberstars.pro/register-tanzania/

CyberStars Tanzania 2020 Cybersecurity competitions have proven to be an effective way for finding new cybersecurity talents and fostering the development of the required cybersecurity competencies. In this regard, the Tanzania Communications Regulatory Authority (TCRA) has partnered with Silensec in organizing a national cyber-security competition called the Cyber Stars of …

Read More »

CAPACITY BUILDING: NETWORK AND SYSTEMS MONITORING TRAINING, IN ZANZIBAR

TCRA Zanzibar Zonal Manager Opening Remarks

In effort to ensure a high and effective level of Network and Information Security within the country, Tanzania Computer Emergency Response Team (TZ-CERT) continues to carry out technical capacity building programs to it’s constituents. Between 14th and 18th  September 2020, TZ-CERT conducted a technical capacity building program in Network and …

Read More »

CAPACITY BUILDING: ICT SYSTEMS SECURITY TRAINING, IN DODOMA

Director of ICT Application and Services, Opening the Training

Tanzania Computer Emergency Response Team (TZ-CERT) is mandated to raise awareness and enhance technical capacity in the area of cybersecurity. Between 20th to 30th July 2020, TZ-CERT carried out technical capacity building programs to different constituents in the different cybersecurity domain. A total of twenty (20) ICT officers benefited from …

Read More »

THE EXPLOITATION OF NETLOGON CONTINUES TO INCREASE

Microsoft Netlogon Elevation of Privilege vulnerability was first published on 11th August 2020 by the Microsoft Security Advisory as a publicly disclosed computer security flaw with reference CVE-2020-172. Talos, Cisco’s threat intelligence organisation, has been tracking exploit attempts against this vulnerability and confirm a potential rise. The exploitation of this …

Read More »

CYBERSECURITY AWARENESS PROGRAM

TZ-CERT Awareness Program

Tanzania Computer Emergency Response Team (TZ-CERT is mandated to raise awareness and enhance technical capacity in the area of cybersecurity. Between 27th July to 18th September 2020, TZ-CERT carried out cybersecurity awareness program in nine (9) public institutions namely: Tanzania Investment Centre (TIC), Tanzania Airport Authority (TAA), National Housing Corporation …

Read More »

SAFER INTERNET DAY

#SID2020

TCRA commemorated Safer Internet Day 2020 (SID2020) on Tuesday 11th February, 2020 at the University of Dar Es Salaam main library conference centre. Safer Internet Day is celebrated yearly with an intent to promote and stimulate the safe and positive use of digital technologies in society especially among youth and …

Read More »

CAPACITY BULDING PROGRAM (TRAINING AND DRILLS)

TCRA through TZ-CERT prepared the capacity building program to its constituents held from 27th January, 2020 to 7th February, 2020. The program held at the Bank of Tanzania conference room comprised of training and cyber drills aimed at enhancing constituent’s cybersecurity incident handling capabilities. Trainees from 35 invited institutions learned …

Read More »

NATIONAL CYBERSTARS COMPETITION

CyberStars is the competition aimed at raising cyber security knowledge and identify individuals with cyber security skills in Tanzania. The competition is carried out through online platform targeting youths at the age of 18 to 24 covered Cyber Security domains (Ethical hacking, Cyber defense and incident Handling). The national final …

Read More »

PHOBOS RANSOMWARE ATTACK

TZ-CERT has observed a new and sophisticated techniques that ransomware actors are currently using to infect targeted victims across the globe. The ransomware actors have launched a new variant of ransomware known as “Phobos” reported to take advantage of an open or poorly secured Remote Desktop Port (RDP) from a …

Read More »

RANSOMWARE OUTBREAK

Ransomware

Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Principally, it encrypts files on the compromised systems and demands from victims a ransom in crypto-currency to decrypt them. <<readmore>>

Read More »