When is KaCyber 1.0 going live?

Thanks

Hello, KaCyber Community!!!!

Our team has been working around the clock on our first release of KaCyber app. This is a quick introduction post to update you on the progress of how things have been going.

First off, we apologise since we severely underestimated the release date for when KaCyber 1.0 would be complete. We expected it sometime in mid-June based off what we had already completed, against what was still left to do, yet here we are already into August. Such is the nature of development.
We do sincerely apologise for underestimating our release date. That falls on us, and we take full responsibility for it and will ensure to release the product before the end of September.

Thankfully though, all our hard work, KaCyber version 1.0 is simply amazing! We are so excited about it, and we know you are as well. Each and every day so many of our amazing followers and business users send in emails and WhatsApp asking … “When is KaCyber 1.0 going live?!?!?”.

We can’t express how humbled we feel to know the dedication our user base feels towards the development of KaCyber App.

It is difficult for our team to continue and tell everyone that KaCyber App “is coming soon”, yet that is the truth, it is “coming soon”!
Simply put, this is our first massive project at KaCyber Security Technologies, loaded with goodies that aim at making your life easier by allowing you to connect with friends, family and businesses in your local city, that you care about.

We’re working around the clock to ensure everything is ready for this release. To keep informed and track our release date follow our Blog and Sign up for updates at https://www.blog.kacyber.net — Bridging the Digital Divide

You may be interested in:

Android Developers: What New in Android Oreo for Developers

How the Industrial Internet of Things (IIoT) is revolutionizing industry

food-on-mobile

How the Industrial Internet of Things (IIoT) is revolutionising industry

The Industrial Internet of Things (IIoT) has been heralded as transformational, by offering hitherto unparalleled levels of growth opportunities and efficiencies

For industries of all kinds – from farming to aerospace – harnessing the use of connected devices, machine-to-machine (M2M) technology and big data is creating a revolution that will cut production times, reduce inefficiencies through predictive maintenance, boosting outputs and increasing revenues.

Also known as Industry 4.0, the benefits of the IIoT are being adopted by an ever-increasing number of companies, and its use and application is expected to explode in coming years.

Indeed, research by Business Insider UK suggests that the installation of manufacturing IoT devices is projected to grow from 237 million in 2015 to 923 million in 2020 and that by then, global manufacturers will invest $70 billion in IoT solutions, up from $29 billion in 2015.

More complex IIoT applications are already beginning to emerge, and autonomous robots and augmented reality are likely to become more commonplace soon. But what other ways can the IIoT be applied? We take a look at just a few…

1. Game of drones

Drones are seemingly everywhere these days. But far from being the latest tech fad, their unique ability to access hard to reach places and collect vital data could see them make a massive impact in a wide variety of industrial applications. Sensor-packed drones are fast being harnessed by the construction industry in particular, as well as companies as diverse as UPS, the US military and even UK farms.

2. Farmer’s friend

Speaking of farming, the IIoT is arguably at its most potent in this sector and is making a big impact on farms across the globe. Farmers are using high-tech farming techniques such as sensors in fields that provide data on soil acidity or topography for example. Being able to monitor equipment performance or livestock feeding via a smartphone is another useful capability, and by collating the data provided by connected devices from across their farms, farmers can make more accurate predictions and react more speedily than ever before.

3. A dusty future

It might sound like a concept dreamt up as part of an 80s Hollywood sci-fi movie, but the smart dust can be used in an almost endless range of applications. Made up of microscopic sensors just a few millimetres wide, smart dust particles can measure things such as vibration, temperature or chemical components and relay that data to a connected device. And because of their tiny size, they’re able to be used in situations where no other form of sensor could.

Predicted by Gartner to be a major emerging technological trend, potential smart dust applications range from agriculture and factory manufacturing settings to oil exploration, neurosurgery and even the exploration of new planets.

The High Costs of Free SDKs

open-source

In this day and age of massive data collection, data security and privacy are top of mind for many enterprises and consumers. The concern centers around the collection and use of Personally identifiable information (PII) / sensitive personal information (SPI).
iOS-androidEnterprises that ship mobile apps need to be careful which third-party libraries and SDKs are included during the development stage. The issue is that many tools are available for free, but end up harvesting user data in order to monetize it through targeted advertising. The vast majority of the time this is against the legal policy of the enterprise, as well as the end user license agreement (EULA) between the company’s software and its end users.Developers often have no idea this is happening behind the scenes for two reasons:

  1. SDKs are black boxes, so the harvesting of the data is hidden from the developer; and,
  2. to download the SDK, the developer signs up and agrees unknowingly to terms and conditions (click-through agreements) permitting the practice.

The realization that developer freeware is exposing your customer data causes alarm. To prevent this from happening, digital leads should audit which service providers are in use, especially those that do not require payment or a subscription fee. Any third-party code or SDKs that did not receive sign off from legal should be removed immediately. Your legal professionals should review the terms and conditions.

EU & COPPA

This practice is even more problematic for global enterprises, as well as enterprises that may have end users under the age of 13.
The Data Protection Directive outlines movement of personal data within the European Union. The replacement for Safe Harbor, EU-US Privacy Shield, still under legal scrutiny, outlines the transfer of that data to the US. Free tools will often try to get around the EU restrictions by requiring the developer to prompt the end-user for permission to release their personal information. In practice, this almost never happens for the reasons mentioned before: developers do not read the terms and product managers aren’t aware of the requirement. This puts enterprises out of compliance with data privacy laws in the EU.
Finally, companies that collect data from minors must comply with the Children’s Online Privacy Protection Rule (COPPA). Companies that harvest user information behind the scenes are not COPPA compliant. Parental consent must be given, along with many other requirements, in order to collect PII/SPI from minors.

Summary

While it can seem daunting to keep up with the latest regulations regarding data security and privacy, enterprises can deploy a proper vetting process to get ahead of any issues with their apps. It is recommended that you review the third-party tools embedded in your apps, make sure your team is educated on the legal requirements, and ensure you’re in compliance with local regulations.

PC shipments were still in the pits this holiday

At least the declines aren’t as calamitous as they were a year earlier.

pc_blackSo much for the PC world recovering from 2015’s holiday disaster. Both Gartner and IDC estimate that worldwide computer shipments were down year-over-year in the fourth quarter of 2016. The decline wasn’t nearly as bad as it was a year ago (1.5 percent with IDC’s methodology, 3.7 percent with Gartner’s), but that’s not saying much — it just means that the industry didn’t stay in freefall for long. Just why things turned out so glumly varies depending on who you ask, though.

IDC is optimistic and sees this as a sign that the computer business is catching a break now that growth in smartphone and tablet sales is slowing down. Gartner, however, isn’t quite so cheerful. It sees the drop as evidence of “stagnation” and the shift in just how people buy PCs. While there’s fast growth among enthusiasts (think gamers and power users), that’s more than offset by the majority of ‘casual’ buyers who are holding off as they spend more time on their phones. If you only occasionally use your PC, you’re more likely to wait longer before replacing it.

There has been a bit of a shakeup among the leaders. While Lenovo, HP, and Dell are still atop the ranks and gaining share, Apple appears to have made a slight recovery thanks to pent-up demand for a new MacBook Pro. The biggest losers were Acer, ASUS and a slew of smaller manufacturers.

The estimates also represent a milestone that the PC world would likely rather forget. It’s the fifth year in a row that shipments are down overall, at roughly 6 percent for both Gartner and IDC. Although there are signs that the market is leveling off, the data casts doubt on previous claims that the computer business is just facing an extended rough patch due to smartphones and slow-to-upgrade corporate customers. This sluggishness increasingly looks like the new normal, and there’s no obvious point at which demand is likely to bounce back.

Mobile devices and apps Trend

2FA

Two factor authentication and the safety of mobile-based payments

In most industry sectors, employees would want to have access to all their apps from any mobile device, including their own personal devices. This has accelerated expansion of modern mobile apps beyond conventional tools and use cases such as mobile email, calendar and contact management. In fact, last year, Gartner, Inc predicted that:

  • In 2015, more than 75% of mobile applications will fail basic security tests
  • By 2017, the focus of endpoint breaches will shift to tablets and smartphones
  • Through 2018, a variety of devices, user contexts, and interaction paradigms will make “everything everywhere” strategies unachievable

Mobile Computing and Security

Today, for many people worldwide, mobile banking or mobile device initiated transactions have just become natural—more people than ever before are managing their finances from their smart mobile device. It is also worth to note that everything people do especially on their mobile, they do it expecting it to be secure.
Last year, a research presented by KPMG, reported that—roughly 25% of the world’s population will have a mobile banking account by the end of 2018; and mobile banking growth is fastest in developing countries, but its security remains a major concern. With the booming adoption of mobile payments, online fraud is has also continued to surge, especially within the financial industry. But the escalating reliance upon mobile computing has introduced many new security risks hence satisfying mobility requirements is becoming more challenging. For instance, allowing users to access all their apps and data from untrusted devices and unpredictable locations raises significant security concerns and also pose new challenges for information security and privacy.

Key challenge in Information Security

More employees than ever are demanding access to applications and data that help them achieve maximum productivity outside the office; moreover mobile devices like smartphones and tablets offer new mobility and flexibility for people and IT. But the escalating reliance upon mobile computing has introduced many new security risks hence satisfying mobility requirements is becoming more challenging. For instance, allowing users to access all their apps and data from untrusted devices and unpredictable locations raises significant security concerns and also pose new challenges for information security and privacy.

In most case, to do significant damage in the mobile world, malware would need to act on devices that have been altered at an administrative level. End-users practices like ‘jailbreaking’ for iOS or ‘rooting’ for Android devices escalate the user’s privileges on the device, effectively turning a user into an administrator allowing users to access certain device resources that are normally inaccessible ( in most cases performed deliberately by users), but they also put data in danger. This is because they remove app-specific protections and the safe ‘sandbox’ provided by the operating system allowing malware to be easily downloaded to the device and being open to all sorts of malicious actions, including extraction of enterprise data. The ‘Rooted’ or ‘jailbroken’ mobile devices also become prone to brute force attacks on pass codes.

Apps Security and the evolving business risks

Mobile applications are changing the way business is done today, offering instant access to services for end-users. As enterprise employees download from app stores and use mobile applications that can access enterprise assets or perform business functions, IT security must evolve security programs to adapt to new forces like cloud, mobile communications and social media. This is because these applications are exposed to attacks and violations of enterprise security policies.

Defending against possible attacks from mobile platforms

Enterprises that embrace mobile computing and bring your own device (BYOD) strategies are vulnerable to security breaches unless they adopt methods and technologies for mobile application security testing and risk assurance.

Most enterprises are inexperienced in mobile application security, even when application security testing is undertaken; it is often done casually by developers who are mostly concerned with the functionality of applications, not their security. Attackers are taking advantage of this and the many complexities created by the mobile ecosystem to exploit vulnerabilities, resulting in sophisticated fraud schemes and theft of sensitive data.

In this article we argue that the best defense mechanism for mobile security is to keep mobile devices fixed in a safe configuration and follow a mobile device management (MDM) policy or an enterprise mobility management baseline for all mobile devices. Meanwhile, IT security leaders also need to use network access control methods to deny enterprise connections for devices that exhibit potentially suspicious activity and deploy strong identity authentication mechanisms to prevent possible attacks on the core network infrastructure.

%d bloggers like this: