Connect with us

Tech

Google Invests $1 Billion in Subsea Fiber-Optic Cable Connecting Africa and Australia

Published

on

Google Invests $1 Billion in Subsea Fiber-Optic Cable Connecting Africa and Australia

Google has announced plans to con- struct a subsea fiber-optic cable connecting Africa and Australia,

a project that promises to revolution- ize digital connectivity and economic growth across the continent.

The new cable, dubbed “Umoja,” which is Swahili for “unity,” will directly link Africa and Australia, reducing latency and enabling faster data transfer between the two continents.

The announcement, made on May 23, 2024, marks a significant milestone in Google’s ongoing efforts to bridge the digital divide and empower communities globally.

The project is expected to take several years to complete, with a estimated completion date of 2026.

The Umoja cable will start in Kenya and run through various countries, including the Democratic Republic of the Congo, Rwanda, Uganda, Zambia, Zimbabwe, and k Africa, before crossing the Indian Ocean to Australia. The terrestrial part of the route is already complete, with Google collaborating with Liquid Intelligent Technologies on the project.

According to Brian Quigley, VP for Global Network Infrastructure at Google Cloud, “Umoja will enable African countries to more reliably connect with each other and the rest of the world.

Establishing a new route distinct from existing connectivity routes is critical to

maintaining a resilient network for a region that has historically experienced high-impact outages.”

The project has garnered enthusiastic support from various stakeholders, including Meg Whitman, the U.S. Ambassador to Kenya, who emphasized the project’s significance for Kenya’s digital transformation journey. “This is a momentous occasion,” she remarked.

“Access to the latest technologies, underpinned by dependable and resilient digital infrastructure, is essential for fostering economic opportunities.”

Google’s investment in the Umoja cable is a testament to the company’s ongoing commitment to promoting digital inclusion and fostering sustain- able economic growth in Africa. As the project progresses, it is expected to have a transformative impact on the digital landscape of the continent, paving the way for a future of enhanced connectivity, economic opportunity, and global collaboration.

With the Umoja cable, Google is poised to play a critical role in shaping the future of digital connectivity in Africa, empowering businesses, communities, and individuals to fully leverage the potential of the digital age.

 

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

The WhatsApp Hack: How Your Account Can Be Compromised In Minutes

Published

on

By

The WhatsApp Hack: How Your Account Can Be Compromised In Minutes

A growing number of WhatsApp users in India are falling prey to hacking, with experts warning of a rising threat to online security. Shantanu Gupta, a noted author and political analyst, recently had his WhatsApp account hacked, highlighting the vulnerability of the popular messaging platform. Gupta’s account was compromised during a routine train journey, with the hacker gaining access to his contacts and sending messages demanding money.

Despite regaining control of his account within hours with the help of the police, Gupta expressed frustration with Meta, WhatsApp’s parent company, and his network provider, Airtel, for their lack of support and security measures. “What shocked me was how easily my account was compromised,” Gupta said. “All they needed was my phone number and access to the voice OTP, and they could configure WhatsApp on another device. It’s unsettling that my network provider didn’t even verify or send a warning SMS before allowing such a crucial call to be redirected.

“Gupta’s experience is not an isolated incident. Manish, another WhatsApp user, has been facing a strange issue where his account is taken over every night, with unusual activity occurring, including the creation of WhatsApp groups with unknown numbers. Despite enabling two-factor authentication, Manish has been unable to prevent the hacking.

“I’m at my wit’s end,” Manish said. “Every morning, I have to request a review from WhatsApp and regain access to my account. It’s like someone is playing a game with me, and I don’t know how to stop it. “Experts warn that WhatsApp hacking is a growing threat, with attackers using social engineering, technical exploits, and SIM-based attacks to hijack accounts.

Common hacking methods include OTP phishing, SIM swapping, WhatsApp Web hijacking, and call merging scams. “WhatsApp hacking is a serious concern, and users need to be aware of the risks,” said Gautam Kumawat, a professional hacker and founder of Hacking Flix.

“Attackers are using sophisticated methods to gain access to accounts, and users need to take proactive steps to protect themselves.” To safeguard against these threats, experts recommend enabling two-factor authentication, using a SIM PIN, regularly checking linked devices, and being cautious when receiving unexpected OTPs or calls.

Users should never share their six-digit PIN with anyone, not even friends or family,” said Shiv Raj, Additional Superintendent (ASP), Banda district, a cybercrime expert and PPS officer of Uttar Pradesh Police. “They should also be wary of suspicious links or messages asking for personal information.”

In response to the growing concern, a Meta spokesperson emphasized the company’s commitment to user safety, advising users to never share their six-digit PIN and to enable two-step verification for added security.

“WhatsApp continues to invest in technology, safety tools, and resources to help users safeguard themselves from online scams,” the spokesperson said. “We advise people to be cautious when receiving un-expected OTPs or calls and to report any suspicious activity to us immediately.”

The WhatsApp Hack: How Your Account Can Be Compromised In Minutes

Continue Reading

Business

SpaceX Capsule Delivers Four Astronauts To International Space Station

Published

on

By

SpaceX Capsule Delivers Four Astronauts To International Space Station

In a remarkable crew-swap mission, a SpaceX capsule successfully docked at the International Space Station (ISS) on Sunday, delivering four astronauts and paving the way for the return of two stuck astronauts, Butch Wilmore and Sunita Williams, after nine months in orbit.

The Crew-10 astronauts’ SpaceX Crew Dragon capsule launched from NASA’s Kennedy Space Center in Florida on Friday at 7:03 p.m. ET and docked at the ISS approximately 29 hours later, at 12:04 a.m. ET (0404 GMT) on Sunday. The seven-member crew of the ISS, including Wilmore and Williams, welcomed the new arrivals.

Wilmore and Williams, veteran NASA astronauts and retired Navy test pilots, have been stranded on the ISS due to problems with Boeing’s Star-liner capsule. Their return to Earth is now imminent, with a scheduled departure on Wednesday at 4 a.m. ET (0800 GMT), alongside NASA astronaut Nick Hague and Russian cosmonaut Aleksandr Gorbunov.

The Crew-10 mission has been marked by controversy, with President Donald Trump and his adviser Elon Musk, also SpaceX’s CEO, urging a quicker launch and claiming that Trump’s predecessor, Joe Biden, had abandoned Wilmore and Williams on the station for political reasons.

Despite the politics, Wilmore and Williams have continued to conduct scientific research and routine maintenance on the ISS. Williams expressed her excitement about returning home to her family and two dogs, saying, “It’s been a roller coaster for them, probably a little bit more so than for us. “The Crew-10 crew, comprising NASA astronauts Anne McClain and Nichole Ayers, Japanese astronaut Takuya Onishi, and Russian cosmonaut Kirill Peskov, will spend approximately six months on the ISS.

SpaceX Capsule Delivers Four Astronauts To International Space Station

Continue Reading

Business

The Rising Tide of Cyber Threats: How to Protect Your Personal Devices and Prevent Financial Loss

Published

on

By

The Rising Tide Of Cyber Threats: How To Protect Your Personal Devices And Prevent Financial Loss

In today’s interconnected world, cybercriminals are be-coming increasingly adept at exploiting vulnerabilities in personal devices to extract sensitive information from unsuspecting victims. As hacking attempts grow more sophisticated, experts are sounding the alarm on the importance of adopting robust security measures to safeguard personal devices and prevent devastating financial losses. The alarming rise in cybersecurity breaches has resulted in staggering financial losses, with the International Monetary Fund reporting that losses from cyber incidents have quadrupled since 2017. While the average loss hovers around $0.5 million, severe at-tacks can have catastrophic consequences, costing companies as much as $2.5 billion once every decade.

The sheer scale of these losses reiterates the urgent need for individuals and organizations to prioritize cybersecurity and protect their personal devices from the ever-evolving threats posed by cybercriminals. As the digital landscape continues to shift and vulnerabilities are exploited, it is crucial that we adopt a proactive approach to cybersecurity, rather than simply reacting to threats as they arise. Experts agree that a multi-layered approach to cybersecurity is essential, incorporating robust security measures, regular soft-ware updates, and a healthy dose of skepticism when interacting with online content.

One of the most critical steps in protecting personal devices is to ensure that all software and operating systems are up-to-date. In addition to regular updates, it is essential to adopt robust security measures, such as fire-walls, antivirus software, and encryption. These measures can help to prevent cybercriminals from gaining access to personal de-vices and extracting sensitive information. However, even with robust security measures in place, it is still possible for cybercriminals to exploit vulnerabilities in personal devices. This is why it is crucial to adopt a healthy dose of skepticism when interacting with online content. This includes being cautious when clicking on links or opening attachments from unknown sources, as well as being wary of phishing scams and other types of social engineering attacks.

As the digital landscape continues to evolve and cyber threats become increasingly sophisticated, it is clear that cybersecurity must be a top priority for individuals and organizations alike. By adopting a proactive approach to cybersecurity, incorporating robust security measures, regular software updates, and a healthy dose of skepticism, we can help to prevent devastating financial losses and protect our personal devices from the rising tide of cyber threats.”

Cybersecurity is no longer a luxury, it’s a necessity,” said Beckham Anderson, a leading cybersecurity expert. “As cyber threats continue to evolve, it’s essential that we stay one step ahead by adopting a multi-layered approach to cybersecurity. This includes regular software updates, robust security measures, and a healthy dose of skepticism when interacting with online content. “The rising tide of cyber threats poses a significant risk to individuals and organizations alike. However, by prioritizing cybersecurity and adopting a multi-layered approach to protecting personal devices, we can help to prevent devastating financial losses and safeguard our sensitive information. As the digital landscape continues to evolve, it is crucial that we remain vigilant and proactive in our approach to cybersecurity, ensuring that we are always one step ahead of the cybercriminals.

The Rising Tide of Cyber Threats: How to Protect Your Personal Devices and Prevent Financial Loss - Diaspora Watch newspaper

 

Continue Reading

Trending