Home » tech news africa » Page 34

tech news africa

“Yellow Card” Seeks to Shake Up Cryptocurrency in Kenya

Image sourced from Kryptocurrency. /* custom css */ .tdi_4_770.td-a-rec-img{ text-align: left; }.tdi_4_770.td-a-rec-img img{ margin: 0 auto 0 0; } Yellow Card, a leading Africa-focused finance platform for trading cryptocurrencies has finally arrived in Kenya. The company claims it already has offices in 9 African countries, allowing customers from Nigeria, Botswana, Cameroon and South Africa, and others, to buy and sell crypto through its platform. “Yellow Card is a cryptocurrency exchange on which you can buy or sell supported cryptocurrencies with your local currency,” reads Yellow Card’s official website. /* custom css */ .tdi_3_776.td-a-rec-img{ text-align: left; }.tdi_3_776.td-a-rec-img img{ margin: 0 auto 0 0; } The company “offers a secure cryptocurrency wallet with which you send,...

Using AI Will Always Require a Human Touch

Image sourced from Software One. /* custom css */ .tdi_4_096.td-a-rec-img{ text-align: left; }.tdi_4_096.td-a-rec-img img{ margin: 0 auto 0 0; } Decision-makers are concerned about how the use of artificial intelligence (AI) technology can negatively impact their brand and result in a loss of stakeholder and customer trust. In fact, research has shown that 56% of executives globally have slowed down their AI adoptions because of such fears. These concerns have given rise to the concept of Responsible AI (RAI). It refers to the way organisations use AI technologies, and the adherence to certain principles that relate to the greater good, the protection of individuals and their fundamental rights, and generally the trustworthiness of the AI application. While everybody has a role to play in ...

How COVID-19 Has Driven a Cashless World Through Contactless Payments

Image sourced from PYMNTS. /* custom css */ .tdi_4_560.td-a-rec-img{ text-align: left; }.tdi_4_560.td-a-rec-img img{ margin: 0 auto 0 0; } Driven by the COVID-19 pandemic, contactless payments have become the world’s preferred payment method. In addition to being safer from a viral transmission perspective, contactless payments are also faster, and integrating multiple contactless payment methods assists small businesses to better maintain financial liquidity. While choice in payment methods boosts Customer Experience (CX), we still have a way to go before South Africa fully embraces cashless payments. This will necessitate educating the population on card security and business owners on the benefits of contactless payments and the reduction of cash on hand. Formal vs Informal Trading /* c...

Location Intelligence is Key to Understanding New Customer Behaviours Post-Pandemic

Image sourced from Geospatial World. /* custom css */ .tdi_4_271.td-a-rec-img{ text-align: left; }.tdi_4_271.td-a-rec-img img{ margin: 0 auto 0 0; } The COVID-19 pandemic was a major disruptor for the retail sector. Practically overnight, customer buying patterns and behaviours changed, and have continued to shift ever since. This had made it challenging to meet customer expectations effectively. Retailers need to harness the power of location intelligence to help them better understand how their customers’ needs have changed and continue to change. What is Location Intelligence? Forrester, a research and advisory company, defines location intelligence as “the practice of collecting and managing customer location data, enriching it with other data sources, and analysing for contextual...

5 Crucial Things You Need to Do When You Receive A Phishing Email

Image sourced from Kaspersky. You may not even notice when you receive one, most suspicious emails are automatically sorted to spam by your email service – though, a few may slip through the cracks, and one or two may even be authentic enough for you to click through their contents. The most important thing to remember about phishing emails is that unless you open any attachments or click on any links, you will not be affected by malware. Phishing emails are based on social engineering and work off bait, hence the name, and unless the bait is taken you can’t be affected by the cybercriminals holding the rod, fingers twitching at the reel. If you’re not familiar with these kinds of emails or begin to feel nervous or panicked when you receive one – this list is for you. Here are 6 crucial th...

Facebook, Instagram & Other Social Media MUST Register with Nigerian Govt to Continue Operations

/* custom css */ .tdi_4_653.td-a-rec-img{ text-align: left; }.tdi_4_653.td-a-rec-img img{ margin: 0 auto 0 0; } A week after the country indefinitely suspended social media service Twitter, the Nigerian Federal Government has said that any social media giant, including Facebook, Twitter and others must register in the country to continue to be able to do business and operate unhindered. Users who access Twitter against the ban will be prosecuted, the government warned on Wednesday. Lai Mohammed, Minister of Information and Culture, yesterday also revealed that Twitter has contacted the Nigerian government to begin “high-level discussions” in order to begin operating in the country legally once again. The Minister had disclosed this information while briefing the media after the weekly Fede...

MultiChoice Sees Surge in Earnings Amidst Subscriber Boom

Image sourced from The Vanguard Nigeria /* custom css */ .tdi_4_dc2.td-a-rec-img{ text-align: left; }.tdi_4_dc2.td-a-rec-img img{ margin: 0 auto 0 0; } South African broadcasting conglomerate MultiChoice Group reports that it has added 1.4-million 90-day active subscribers to its services between the beginning of 2021 to 31 March. MultiChoice also reports that earnings were exceedingly robust despite the ongoing pandemic. This is partly due to the 7% growth year-on-year of its subscribers. The Johannesburg-based corporation ended 2020 with 20.9-million subscribers – 43% from South Africa, while a further 57% of subscribers from the rest of the continent. /* custom css */ .tdi_3_d36.td-a-rec-img{ text-align: left; }.tdi_3_d36.td-a-rec-img img{ margin: 0 auto 0 0; } Growth in the Face of COV...

Vivo to Launch Flagship V21 Smartphone in Kenya

Image sourced from GSM Arena. /* custom css */ .tdi_4_0c5.td-a-rec-img{ text-align: left; }.tdi_4_0c5.td-a-rec-img img{ margin: 0 auto 0 0; } Chinese tech company Vivo, often stylised as vivo, is gearing to launch the vivo V21 smartphone in Kenya this month. A flagship model with a focus on taking industry-leading selfies is set for the new generation and will be an addition to the V-series smartphones available locally. V21 Specs The V21 will be the first device globally to come with a 44MP selfie camera equipped with both Optical Imaging Stabilization (OIS) and Electronic Imaging Stabilization (EIS) technologies to accurately detect movements and shaking and calibrate the camera accordingly to eliminate motion blurs and produce high-definition selfies as a result. /* custom css */ .tdi_3...

Battlefield 2042 Announced Following Explosively Insane Cinematic Trailer

Image sourced from Electronic Arts. /* custom css */ .tdi_4_e30.td-a-rec-img{ text-align: left; }.tdi_4_e30.td-a-rec-img img{ margin: 0 auto 0 0; } Games publisher EA and developer DICE have finally unveiled the trailer for EA’s next incarnation of its Battlefield series of first-person shooters. Now, featuring a futuristic setting following its predecessor’s historical WW1 theme, Battlefield 2042 was announced with an accompanying cinematic trailer rendered with DICE’s in-game engine. The trailer is an adrenaline-spitting, bullet-filled hell where “explosive” is an understatement. Time will tell if actual gameplay will come anywhere near matching the trailer’s hyper-intensity. Sensitive viewer warning – bloody violence. /* custom css */ .tdi_3_15c.td-a-rec-img{ text-align: left; }.tdi_3_1...

Vulnerabilities in Windows and Chrome Used in Series of Highly Targetted Attacks

In April, Kaspersky experts discovered a number of highly targeted attacks against multiple companies utilising a previously undiscovered chain of Google Chrome and Microsoft Windows zero-day exploits. One of the exploits was used for remote code execution in the Chrome web browser, while the other was an elevation of privilege exploit fine-tuned to target the latest and most prominent builds of Windows 10. The latter exploits two vulnerabilities in the Microsoft Windows OS kernel: Information Disclosure vulnerability CVE-2021-31955 and Elevation of Privilege vulnerability CVE-2021-31956. Microsoft has patched both today as part of Patch Tuesday. Zero-Day Attacks Recent months have seen a wave of advanced threat activity exploiting zero-days on the internet. In mid-April, Kaspersky experts...

Confidential Computing – Why Privacy Should be the Heart of Digital Experiences

Image sourced from Intel. In this past year, the consumer experience came to the forefront. As we faced various stages of lockdowns, we turned to online banking, seeing our doctors remotely, running our businesses using technology and socialising through a screen. Digital interactions became a part of our lives – ever-present and normalised as we navigated changes swept in by this pandemic. As our digital interaction became seamless and permeated through every aspect of our lives, privacy continued to be top of mind. We carried out our lives predominantly online – making many of us more vulnerable to fraudsters. As we navigated living our lives digitally, data theft dominated 2020 as the most common attack in the Middle East and Africa. Across the region, data theft and leaks accounted for...

Mobile Authentication Can Be the Key to Negating Cybercrime in East Africa

Image sourced from BICS. The rapid pace of digital transformation in East Africa has had a significant impact on not only how people live their lives, but also on how communication and commerce are conducted, allowing the modern customer to do everything – immediately. This has also had the unintended consequence of altering the way we are targeted by fraudsters and cybercriminals, notably changing the nature of cyber threats and attacks that we face in a mobile-first digital world. The Price of Cybercrime According to an Accenture report published in 2019, the total value at risk of cybercrime over the next five years is an estimated $5.2 trillion. The average cyberattack costs $13 million, according to the same report, with phishing, social engineering and stolen device crime making up $...