<table cellspacing="0" cellpadding="0" border="0" ><tr><td valign="top" style="font: inherit;">@skunks,<br><br>Check this out...<br>http://www.nation.co.ke/News/Man%20in%20court%20over%20MPesa%20fraud/-/1056/911168/-/2qe56a/-/index.html<br><br>am baffled at how this could have happened. Any one with a "HOWTO" on this? Am of the opinion that the wider a loophole is known, the harder it becomes for the fraudster to con the next guy.<br><br>walu.<br><br><br><br>--- On <b>Sat, 5/1/10, Gichuki John Chuksjonia <i><chuksjonia@gmail.com></i></b> wrote:<br><blockquote style="border-left: 2px solid rgb(16, 16, 255); margin-left: 5px; padding-left: 5px;"><br>From: Gichuki John Chuksjonia <chuksjonia@gmail.com><br>Subject: Re: [kictanet] [Security Forum] Call for Proposals- 2nd Annual Information Communication Technology & Network Security Conference (Secure ICT 2010)<br>To: jwalu@yahoo.com<br>Cc: "KICTAnet ICT Policy Discussions"
<kictanet@lists.kictanet.or.ke><br>Date: Saturday, May 1, 2010, 9:58 AM<br><br><div class="plainMail">Hope this becomes as successful as the last one. Good work Evans<br><br>On 4/28/10, Evans Kahuthu <<a ymailto="mailto:ifani.kinos@gmail.com" href="/mc/compose?to=ifani.kinos@gmail.com">ifani.kinos@gmail.com</a>> wrote:<br>> Dear Listers,<br>><br>> The 2nd Annual Information Communication Technology & Network Security<br>> Conference (Secure ICT 2010) will be held on Sept 8-9, 2010 at the PanAfric<br>> Hotel in Nairobi, Kenya.<br>><br>> Secure ICT 2010 is a "must attend" event for those tasked with protecting<br>> personal or confidential information in a rapidly changing technological<br>> environment. The security of ICT infrastructure is of critical importance.<br>><br>> This year's conference sessions address new and continuing threats to<br>> information security as well as responses to the
increasing risk of security<br>> breaches and data exfiltration, identity theft, cyber terrorism and more.<br>> The conference will provide information security professionals and managers<br>> with the most up-to-date information, tools, trends, legislation, and<br>> strategies for addressing information security issues. Plan to meet with<br>> your colleagues from around the region, the nation and the world in Nairobi<br>> to learn from recognized experts at Secure ICT 2010.<br>><br>> Conference participants are invited to submit proposals for the conference<br>> presentation.<br>><br>> For more information about the conference, visit <a href="http://secureict.co.ke/" target="_blank">http://secureict.co.ke/</a>, To<br>> submit a proposal visit <a href="http://secureict.co.ke/proposals.aspx" target="_blank">http://secureict.co.ke/proposals.aspx</a><br>><br>><br>> Evans<br>><br><br><br>-- <br>-- <br>Gichuki
John Ndirangu, C.E.H , C.P.T.P, O.S.C.P<br>I.T Security Analyst and Penetration Tester<br><a ymailto="mailto:infosigmer@inbox.com" href="/mc/compose?to=infosigmer@inbox.com">infosigmer@inbox.com</a><br><br>{FORUM}<a href="http://lists.my.co.ke/pipermail/security/" target="_blank">http://lists.my.co.ke/pipermail/security/</a><br><a href="http://nspkenya.blogspot.com/" target="_blank">http://nspkenya.blogspot.com/</a><br><a href="http://chuksjonia.blogspot.com/" target="_blank">http://chuksjonia.blogspot.com/</a><br><br>_______________________________________________<br>kictanet mailing list<br><a ymailto="mailto:kictanet@lists.kictanet.or.ke" href="/mc/compose?to=kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br><a href="http://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">http://lists.kictanet.or.ke/mailman/listinfo/kictanet</a><br><br>This message was sent to: <a ymailto="mailto:jwalu@yahoo.com"
href="/mc/compose?to=jwalu@yahoo.com">jwalu@yahoo.com</a><br>Unsubscribe or change your options at <a href="http://lists.kictanet.or.ke/mailman/options/kictanet/jwalu%40yahoo.com" target="_blank">http://lists.kictanet.or.ke/mailman/options/kictanet/jwalu%40yahoo.com</a><br></div></blockquote></td></tr></table><br>