Tech
TikTok Unveils Inaugural Visionary Voices List For Africa

TikTok has announced its first-ever Visionary Voices List for Africa, recognizing 15 individuals who are driving innovation and cultural representation across the continent. The list honors creators, small business owners, and industry disruptors who are making significant contributions to African music, arts, entertainment, and cultural diversity.
The creators’ category features individuals who have captivated audiences with their engaging content, including comedians, sports enthusiasts, and dancers. The small-owned businesses category recognizes entrepreneurs who are using the platform to showcase their unique products and services, revolutionizing their industries and demonstrating the intersection of vision, creativity, and success.
The Industry Disruptors category honors individuals who are challenging conventional industries with innovative perspectives, reshaping their fields and driving positive change. According to TikTok, these pioneers are placing Africa on the global map.
Boniswa Sidaba, Head of Content Operations, Sub-Saharan Africa at TikTok, commented, “The Visionary Voices List Africa celebrates the extraordinary talent and innovative spirit of the African community. These 15 individuals have made a profound impact on and off the platform, and their dedication to cultural representation and innovation is truly inspiring.”
Tech
The WhatsApp Hack: How Your Account Can Be Compromised In Minutes

A growing number of WhatsApp users in India are falling prey to hacking, with experts warning of a rising threat to online security. Shantanu Gupta, a noted author and political analyst, recently had his WhatsApp account hacked, highlighting the vulnerability of the popular messaging platform. Gupta’s account was compromised during a routine train journey, with the hacker gaining access to his contacts and sending messages demanding money.
Despite regaining control of his account within hours with the help of the police, Gupta expressed frustration with Meta, WhatsApp’s parent company, and his network provider, Airtel, for their lack of support and security measures. “What shocked me was how easily my account was compromised,” Gupta said. “All they needed was my phone number and access to the voice OTP, and they could configure WhatsApp on another device. It’s unsettling that my network provider didn’t even verify or send a warning SMS before allowing such a crucial call to be redirected.
“Gupta’s experience is not an isolated incident. Manish, another WhatsApp user, has been facing a strange issue where his account is taken over every night, with unusual activity occurring, including the creation of WhatsApp groups with unknown numbers. Despite enabling two-factor authentication, Manish has been unable to prevent the hacking.
“I’m at my wit’s end,” Manish said. “Every morning, I have to request a review from WhatsApp and regain access to my account. It’s like someone is playing a game with me, and I don’t know how to stop it. “Experts warn that WhatsApp hacking is a growing threat, with attackers using social engineering, technical exploits, and SIM-based attacks to hijack accounts.
Common hacking methods include OTP phishing, SIM swapping, WhatsApp Web hijacking, and call merging scams. “WhatsApp hacking is a serious concern, and users need to be aware of the risks,” said Gautam Kumawat, a professional hacker and founder of Hacking Flix.
“Attackers are using sophisticated methods to gain access to accounts, and users need to take proactive steps to protect themselves.” To safeguard against these threats, experts recommend enabling two-factor authentication, using a SIM PIN, regularly checking linked devices, and being cautious when receiving unexpected OTPs or calls.
Users should never share their six-digit PIN with anyone, not even friends or family,” said Shiv Raj, Additional Superintendent (ASP), Banda district, a cybercrime expert and PPS officer of Uttar Pradesh Police. “They should also be wary of suspicious links or messages asking for personal information.”
In response to the growing concern, a Meta spokesperson emphasized the company’s commitment to user safety, advising users to never share their six-digit PIN and to enable two-step verification for added security.
“WhatsApp continues to invest in technology, safety tools, and resources to help users safeguard themselves from online scams,” the spokesperson said. “We advise people to be cautious when receiving un-expected OTPs or calls and to report any suspicious activity to us immediately.”
Business
SpaceX Capsule Delivers Four Astronauts To International Space Station

In a remarkable crew-swap mission, a SpaceX capsule successfully docked at the International Space Station (ISS) on Sunday, delivering four astronauts and paving the way for the return of two stuck astronauts, Butch Wilmore and Sunita Williams, after nine months in orbit.
The Crew-10 astronauts’ SpaceX Crew Dragon capsule launched from NASA’s Kennedy Space Center in Florida on Friday at 7:03 p.m. ET and docked at the ISS approximately 29 hours later, at 12:04 a.m. ET (0404 GMT) on Sunday. The seven-member crew of the ISS, including Wilmore and Williams, welcomed the new arrivals.
Wilmore and Williams, veteran NASA astronauts and retired Navy test pilots, have been stranded on the ISS due to problems with Boeing’s Star-liner capsule. Their return to Earth is now imminent, with a scheduled departure on Wednesday at 4 a.m. ET (0800 GMT), alongside NASA astronaut Nick Hague and Russian cosmonaut Aleksandr Gorbunov.
The Crew-10 mission has been marked by controversy, with President Donald Trump and his adviser Elon Musk, also SpaceX’s CEO, urging a quicker launch and claiming that Trump’s predecessor, Joe Biden, had abandoned Wilmore and Williams on the station for political reasons.
Despite the politics, Wilmore and Williams have continued to conduct scientific research and routine maintenance on the ISS. Williams expressed her excitement about returning home to her family and two dogs, saying, “It’s been a roller coaster for them, probably a little bit more so than for us. “The Crew-10 crew, comprising NASA astronauts Anne McClain and Nichole Ayers, Japanese astronaut Takuya Onishi, and Russian cosmonaut Kirill Peskov, will spend approximately six months on the ISS.
Business
The Rising Tide of Cyber Threats: How to Protect Your Personal Devices and Prevent Financial Loss

In today’s interconnected world, cybercriminals are be-coming increasingly adept at exploiting vulnerabilities in personal devices to extract sensitive information from unsuspecting victims. As hacking attempts grow more sophisticated, experts are sounding the alarm on the importance of adopting robust security measures to safeguard personal devices and prevent devastating financial losses. The alarming rise in cybersecurity breaches has resulted in staggering financial losses, with the International Monetary Fund reporting that losses from cyber incidents have quadrupled since 2017. While the average loss hovers around $0.5 million, severe at-tacks can have catastrophic consequences, costing companies as much as $2.5 billion once every decade.
The sheer scale of these losses reiterates the urgent need for individuals and organizations to prioritize cybersecurity and protect their personal devices from the ever-evolving threats posed by cybercriminals. As the digital landscape continues to shift and vulnerabilities are exploited, it is crucial that we adopt a proactive approach to cybersecurity, rather than simply reacting to threats as they arise. Experts agree that a multi-layered approach to cybersecurity is essential, incorporating robust security measures, regular soft-ware updates, and a healthy dose of skepticism when interacting with online content.
One of the most critical steps in protecting personal devices is to ensure that all software and operating systems are up-to-date. In addition to regular updates, it is essential to adopt robust security measures, such as fire-walls, antivirus software, and encryption. These measures can help to prevent cybercriminals from gaining access to personal de-vices and extracting sensitive information. However, even with robust security measures in place, it is still possible for cybercriminals to exploit vulnerabilities in personal devices. This is why it is crucial to adopt a healthy dose of skepticism when interacting with online content. This includes being cautious when clicking on links or opening attachments from unknown sources, as well as being wary of phishing scams and other types of social engineering attacks.
As the digital landscape continues to evolve and cyber threats become increasingly sophisticated, it is clear that cybersecurity must be a top priority for individuals and organizations alike. By adopting a proactive approach to cybersecurity, incorporating robust security measures, regular software updates, and a healthy dose of skepticism, we can help to prevent devastating financial losses and protect our personal devices from the rising tide of cyber threats.”
Cybersecurity is no longer a luxury, it’s a necessity,” said Beckham Anderson, a leading cybersecurity expert. “As cyber threats continue to evolve, it’s essential that we stay one step ahead by adopting a multi-layered approach to cybersecurity. This includes regular software updates, robust security measures, and a healthy dose of skepticism when interacting with online content. “The rising tide of cyber threats poses a significant risk to individuals and organizations alike. However, by prioritizing cybersecurity and adopting a multi-layered approach to protecting personal devices, we can help to prevent devastating financial losses and safeguard our sensitive information. As the digital landscape continues to evolve, it is crucial that we remain vigilant and proactive in our approach to cybersecurity, ensuring that we are always one step ahead of the cybercriminals.