PC shipments were still in the pits this holiday

At least the declines aren’t as calamitous as they were a year earlier.

pc_blackSo much for the PC world recovering from 2015’s holiday disaster. Both Gartner and IDC estimate that worldwide computer shipments were down year-over-year in the fourth quarter of 2016. The decline wasn’t nearly as bad as it was a year ago (1.5 percent with IDC’s methodology, 3.7 percent with Gartner’s), but that’s not saying much — it just means that the industry didn’t stay in freefall for long. Just why things turned out so glumly varies depending on who you ask, though.

IDC is optimistic and sees this as a sign that the computer business is catching a break now that growth in smartphone and tablet sales is slowing down. Gartner, however, isn’t quite so cheerful. It sees the drop as evidence of “stagnation” and the shift in just how people buy PCs. While there’s fast growth among enthusiasts (think gamers and power users), that’s more than offset by the majority of ‘casual’ buyers who are holding off as they spend more time on their phones. If you only occasionally use your PC, you’re more likely to wait longer before replacing it.

There has been a bit of a shakeup among the leaders. While Lenovo, HP, and Dell are still atop the ranks and gaining share, Apple appears to have made a slight recovery thanks to pent-up demand for a new MacBook Pro. The biggest losers were Acer, ASUS and a slew of smaller manufacturers.

The estimates also represent a milestone that the PC world would likely rather forget. It’s the fifth year in a row that shipments are down overall, at roughly 6 percent for both Gartner and IDC. Although there are signs that the market is leveling off, the data casts doubt on previous claims that the computer business is just facing an extended rough patch due to smartphones and slow-to-upgrade corporate customers. This sluggishness increasingly looks like the new normal, and there’s no obvious point at which demand is likely to bounce back.

Mobile devices and apps Trend


Two factor authentication and the safety of mobile-based payments

In most industry sectors, employees would want to have access to all their apps from any mobile device, including their own personal devices. This has accelerated expansion of modern mobile apps beyond conventional tools and use cases such as mobile email, calendar and contact management. In fact, last year, Gartner, Inc predicted that:

  • In 2015, more than 75% of mobile applications will fail basic security tests
  • By 2017, the focus of endpoint breaches will shift to tablets and smartphones
  • Through 2018, a variety of devices, user contexts, and interaction paradigms will make “everything everywhere” strategies unachievable

Mobile Computing and Security

Today, for many people worldwide, mobile banking or mobile device initiated transactions have just become natural—more people than ever before are managing their finances from their smart mobile device. It is also worth to note that everything people do especially on their mobile, they do it expecting it to be secure.
Last year, a research presented by KPMG, reported that—roughly 25% of the world’s population will have a mobile banking account by the end of 2018; and mobile banking growth is fastest in developing countries, but its security remains a major concern. With the booming adoption of mobile payments, online fraud is has also continued to surge, especially within the financial industry. But the escalating reliance upon mobile computing has introduced many new security risks hence satisfying mobility requirements is becoming more challenging. For instance, allowing users to access all their apps and data from untrusted devices and unpredictable locations raises significant security concerns and also pose new challenges for information security and privacy.

Key challenge in Information Security

More employees than ever are demanding access to applications and data that help them achieve maximum productivity outside the office; moreover mobile devices like smartphones and tablets offer new mobility and flexibility for people and IT. But the escalating reliance upon mobile computing has introduced many new security risks hence satisfying mobility requirements is becoming more challenging. For instance, allowing users to access all their apps and data from untrusted devices and unpredictable locations raises significant security concerns and also pose new challenges for information security and privacy.

In most case, to do significant damage in the mobile world, malware would need to act on devices that have been altered at an administrative level. End-users practices like ‘jailbreaking’ for iOS or ‘rooting’ for Android devices escalate the user’s privileges on the device, effectively turning a user into an administrator allowing users to access certain device resources that are normally inaccessible ( in most cases performed deliberately by users), but they also put data in danger. This is because they remove app-specific protections and the safe ‘sandbox’ provided by the operating system allowing malware to be easily downloaded to the device and being open to all sorts of malicious actions, including extraction of enterprise data. The ‘Rooted’ or ‘jailbroken’ mobile devices also become prone to brute force attacks on pass codes.

Apps Security and the evolving business risks

Mobile applications are changing the way business is done today, offering instant access to services for end-users. As enterprise employees download from app stores and use mobile applications that can access enterprise assets or perform business functions, IT security must evolve security programs to adapt to new forces like cloud, mobile communications and social media. This is because these applications are exposed to attacks and violations of enterprise security policies.

Defending against possible attacks from mobile platforms

Enterprises that embrace mobile computing and bring your own device (BYOD) strategies are vulnerable to security breaches unless they adopt methods and technologies for mobile application security testing and risk assurance.

Most enterprises are inexperienced in mobile application security, even when application security testing is undertaken; it is often done casually by developers who are mostly concerned with the functionality of applications, not their security. Attackers are taking advantage of this and the many complexities created by the mobile ecosystem to exploit vulnerabilities, resulting in sophisticated fraud schemes and theft of sensitive data.

In this article we argue that the best defense mechanism for mobile security is to keep mobile devices fixed in a safe configuration and follow a mobile device management (MDM) policy or an enterprise mobility management baseline for all mobile devices. Meanwhile, IT security leaders also need to use network access control methods to deny enterprise connections for devices that exhibit potentially suspicious activity and deploy strong identity authentication mechanisms to prevent possible attacks on the core network infrastructure.

Google Play’s “Best of 2016”


As the year draws to a close, team at Google announced Google Play’s most popular apps, games, music, movies, TV shows and books globally in 2016.

The Force and Harry Potter were no match for a different kind of superhero as Deadpool and “Deadpool Kills the Universe” dominated the movie and book charts this year. Game of Thrones kept The Walking Dead away to once again claim the Iron Throne as the most popular TV show of 2016. Twenty One Pilots had no need to feel “Stressed Out” as their single came in as the number one most streamed song of the year, but don’t feel “Sorry” for Justin Bieber who came in at number two. And, of course, Pokemon GO captured the top trending game spot.

Check out Google Play’s top five lists for the most popular content around the world in 2016 below.

Google Play’s Global Best of 2016 Lists


  1. Face Changer 2
  2. Lumyer – Photo & Selfie Editor
  3. Castbox – Podcast Radio Music
  4. Emoji Keyboard Pro
  5. MSQRD


  1. Pokémon GO
  2. Clash Royale
  3. Traffic Rider
  4. slither.io
  5. Dream League Soccer


  1. Stressed Out, Twenty One Pilots
  2. Sorry, Justin Bieber
  3. One Dance (feat. WizKid & Kyla), Drake
  4. Don’t Let Me Down (feat. Daya), The Chainsmokers
  5. Me, Myself & I, G-Eazy

TOP 5 MOVIES of 2016

  1. Deadpool
  2. Star Wars: The Force Awakens
  3. Zootopia
  4. Captain America: Civil War
  5. Batman v Superman: Dawn Of Justice

TOP 5 TV SHOWS of 2016

  1. Game of Thrones
  2. The Walking Dead
  3. The Big Bang Theory
  4. Mr. Robot
  5. The Flash

TOP 5 BOOKS of 2016

  1. Deadpool Kills the Marvel Universe by Cullen Bunn
  2. Harry Potter and the Cursed Child: Parts One and Two by J.K. Rowling, John
  3. Tiffany, Jack Thorne
  4. The Girl on the Train: A Novel by Paula Hawkins
  5. The Art of War by Tzu Sun
  6. Me Before You: A Novel by Jojo Moyes

We look forward to seeing KaCyber App join the top local list for sub-Saharan countries in 2017 or 2018. We’re still doing our best to catch up.
Get it on Google Play
More news about Google Play trends for 2016 available at https://blog.google/products/google-play/announcing-google-plays-best-2016/

Welcome to KaCyber Blog


KaCyber for Business. Bridging the digital divide within sub-Saharan Africa.

Do you own a business or plan to have an event? KaCyber is the best way to connect with people who care about your business!

Right now on KaCyber someone could be looking for #Fun #Things2Do #Hotel #Restaurant or #anything nearby proper or within your proximity.

On KaCyber, business owners can showcase their products and services or engage an audience that is craving for discovering new stuff!

Create a business account today to discover how powerful and efficiently we can help you connect with customers. Register at http://joinkacyber.com and subscribe to our Blog to receive the latest update directly to your email inbox.

Download KaCyber App Now. It’s a small world.

KaCyber app is available in Google Play Store and coming soon to Apple Store (for iPhones). KaCyber app is a perfect platform to connect with your family and friends and also discover what businesses nearby are offering! Welcome to KaCyber. It’s a small World…

Already on KaCyber, and enjoying our app or have feedback? Leave us a review on your favorite app store, follow us on Twitter, and like us on Facebook.

Need more information?

Get in touch with our team instant registration of your business or more details about our apps and services. You can also email us at info@kacyber.com

We’re excited to see you onboard. Happy Blogging on our website (www.blog.kacyber.com), click to access our beta tester  to download KaCyber app and install it, we bet you will discover what you’re craving for on KaCyber!

 Get it on Google Play

%d bloggers like this: