<p>Sabotage markets, wrlcome to the new digital economy.</p>
<p>Regards</p>
<div class="gmail_quote">On Jun 6, 2017 7:26 AM, "WANGARI KABIRU via kictanet" <<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div><div style="color:#000;background-color:#fff;font-family:garamond,new york,times,serif;font-size:16px"><div id="m_6304612831793462073yui_3_16_0_1_1496691694480_66811"><font id="m_6304612831793462073yui_3_16_0_1_1496691694480_67013" size="5">Wow the digital markets are graduating!</font></div><div id="m_6304612831793462073yui_3_16_0_1_1496691694480_66813"><font size="5"><br></font></div><div id="m_6304612831793462073yui_3_16_0_1_1496691694480_66849"><font id="m_6304612831793462073yui_3_16_0_1_1496691694480_66977" size="5">Blackmarkets, secondhand markets, stolen goods markets, sabortage markets......<br></font></div><div id="m_6304612831793462073yui_3_16_0_1_1496691694480_66850"><font size="5"><br></font></div><div id="m_6304612831793462073yui_3_16_0_1_1496691694480_66852"><font size="5"><br></font></div><div id="m_6304612831793462073yui_3_16_0_1_1496691694480_66904"><font size="5">Blessed day.</font></div><div id="m_6304612831793462073yui_3_16_0_1_1496691694480_66899"><font size="5"><br></font></div><div id="m_6304612831793462073yui_3_16_0_1_1496691694480_66901"><font id="m_6304612831793462073yui_3_16_0_1_1496691694480_67048" size="5">Regards/Wangari<br></font></div><div id="m_6304612831793462073yui_3_16_0_1_1496691694480_66863"><span></span></div><div id="m_6304612831793462073yui_3_16_0_1_1496691694480_66861"> </div><div class="m_6304612831793462073signature" id="m_6304612831793462073yui_3_16_0_1_1496691694480_66856">---<br><font style="font-weight:bold;font-family:verdana,helvetica,sans-serif" id="m_6304612831793462073yui_3_16_0_1_1496691694480_66855" size="2"><span style="color:rgb(127,0,63)" id="m_6304612831793462073yui_3_16_0_1_1496691694480_66859">Pray God Bless. 2013Wangari circa - </span><span style="color:rgb(127,0,63)" id="m_6304612831793462073yui_3_16_0_1_1496691694480_66854">"Being of the Light, We are Restored Through Faith in Mind, Body and Spirit; We Manifest The Kingdom of God on Earth".</span></font><br></div> <div class="m_6304612831793462073qtdSeparateBR"><br><br></div><div class="m_6304612831793462073yahoo_quoted" style="display:block"> <div style="font-family:garamond,new york,times,serif;font-size:16px"> <div style="font-family:HelveticaNeue,Helvetica Neue,Helvetica,Arial,Lucida Grande,Sans-Serif;font-size:16px"> <div dir="ltr"><font size="2" face="Arial"> On Tuesday, 6 June 2017, 5:56, Admin CampusCiti via kictanet <<a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><wbr>> wrote:<br></font></div> <br><br> <div class="m_6304612831793462073y_msg_container"><div id="m_6304612831793462073yiv5148147612"><div><div>From SaaS to PaaS to MaaS..</div><div><br></div><div><div style="margin:0px 0px 1em;padding:0px;border:0px;line-height:inherit;vertical-align:baseline"><span>In May 2017, a new form of ransomware called WannaCry affected more than 230,000 personal and business computers in over 150 countries. The ransomware affected organizations, such as Deutsche Bahn AG (a German railway company), NHS Scotland (the publicly funded healthcare system in Scotland), National Health Service of England, Saudi Telecom Company, and FedEx (an international courier delivery services company). The ransomware attack is now estimated to be one of the largest global security incidents in the history of the Web.</span></div><div style="margin:0px 0px 1em;padding:0px;border:0px;line-height:inherit;vertical-align:baseline"><span>WannaCry is based on the security exploit EternalBlue developed by the U.S. National Security Agency. WannaCry was released by the hacker group The Shadow Brokers. The Shadow Brokers announced that they provide cybercriminals with the opportunity to purchase paid subscription services allowing them to access various exploits and data stolen from important organizations. The hacking group claims to have data from Russian, North Korean, Iranian, and Chinese nuclear weapons, as well as data from the Swift banking network. Thus, shortly, we may witness the increasing popularity of a new Web-based service, namely, malware-as-a-service. The purpose of this article is to examine the history of malware-as-a-service (Section 2), the ecosystem of malware-as-a-service (Section 3), and the state of the art and the future of malware-as-a-service (Section 4). Finally, we draw a conclusion (Section 5).</span></div><div style="margin:0px 0px 1em;padding:0px;border:0px;line-height:inherit;vertical-align:baseline">Read on:-</div><a rel="nofollow" href="http://resources.infosecinstitute.com/malware-as-a-service/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+infosecResources+(InfoSec+Resources)" target="_blank">http://resources.<wbr>infosecinstitute.com/malware-<wbr>as-a-service/?utm_source=<wbr>feedburner&utm_medium=feed&<wbr>utm_campaign=Feed:+<wbr>infosecResources+(InfoSec+<wbr>Resources)</a></div><div><br><br><div><span><b>Ali Hussein</b></span></div><div><b>Hussein & Associates</b></div><div style="font-family:Helvetica;font-size:medium"><a href="tel:0713%20601113" value="+254713601113" target="_blank">+254 0713 601113</a> / <a href="tel:0770%20906375" value="+254770906375" target="_blank">0770906375</a></div><div style="font-family:Helvetica;font-size:medium"><br></div><div><div style="margin:0in 0in 0pt"><span>Twitter: @AliHKassim</span></div><span><font></font></span><div style="margin:0in 0in 0pt"><span>Skype: abu-jomo</span></div><div style="margin:0in 0in 0pt"><span>LinkedIn: <a rel="nofollow" href="http://ke.linkedin.com/in/alihkassim" target="_blank">http://ke.linkedin.<wbr>com/in/alihkassim</a><a rel="nofollow" href="http://ke.linkedin.com/in/alihkassim" target="_blank"><span style="text-decoration:none"></span></a></span></div><span><font></font></span><div style="margin:0in 0in 0pt"></div><font><span>Blog: <a rel="nofollow" href="http://www.alyhussein.com/" target="_blank">www.alyhussein.com</a></span><br></font></div><div><span><br></span></div><div>"Discovery consists in seeing what everyone else has seen and thinking what no one else has thought". ~ Albert Szent-Györgyi</div><div><span><br></span></div>Sent from my iPad</div></div></div>______________________________<wbr>_________________<br>kictanet mailing list<br><a href="mailto:kictanet@lists.kictanet.or.ke" target="_blank">kictanet@lists.kictanet.or.ke</a><br><a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" target="_blank">https://lists.kictanet.or.ke/<wbr>mailman/listinfo/kictanet</a><br>Twitter: <a href="http://twitter.com/kictanet" target="_blank">http://twitter.com/kictanet</a><br>Facebook: <a href="https://www.facebook.com/KICTANet/" target="_blank">https://www.facebook.com/<wbr>KICTANet/</a><br><br>Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/wangarikabiru%40yahoo.co.uk" target="_blank">https://lists.kictanet.or.ke/<wbr>mailman/options/kictanet/<wbr>wangarikabiru%40yahoo.co.uk</a><br><br>The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br><br>KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br><br></div> </div> </div> </div></div></div><br>______________________________<wbr>_________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/<wbr>mailman/listinfo/kictanet</a><br>
Twitter: <a href="http://twitter.com/kictanet" rel="noreferrer" target="_blank">http://twitter.com/kictanet</a><br>
Facebook: <a href="https://www.facebook.com/KICTANet/" rel="noreferrer" target="_blank">https://www.facebook.com/<wbr>KICTANet/</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/otieno.barrack%40gmail.com" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/<wbr>mailman/options/kictanet/<wbr>otieno.barrack%40gmail.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br></blockquote></div>