<p dir="ltr">A very interesting read indeed!!<br>
With the rapid technological developments in ict, the possibility of a legalised malware-as-a-service market is real. As it is today such a service is outlawed in Kenya under the Kenya Information & Communication Act (KICA). Nonetheless our cyber security agencies must be buyers of the service at the darkness market for purposes of finding ways to deal with the vice - the irony of technology!!!</p>
<div class="gmail_extra"><br><div class="gmail_quote">On 6 Jun 2017 05:56, "Admin CampusCiti via kictanet" <<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div dir="auto"><div>From SaaS to PaaS to MaaS..</div><div><br></div><div><p style="box-sizing:border-box;margin:0px 0px 1em;padding:0px;border:0px;line-height:inherit;vertical-align:baseline"><span style="background-color:rgba(255,255,255,0)">In May 2017, a new form of ransomware called WannaCry affected more than 230,000 personal and business computers in over 150 countries. The ransomware affected organizations, such as Deutsche Bahn AG (a German railway company), NHS Scotland (the publicly funded healthcare system in Scotland), National Health Service of England, Saudi Telecom Company, and FedEx (an international courier delivery services company). The ransomware attack is now estimated to be one of the largest global security incidents in the history of the Web.</span></p><p style="box-sizing:border-box;margin:0px 0px 1em;padding:0px;border:0px;line-height:inherit;vertical-align:baseline"><span style="background-color:rgba(255,255,255,0)">WannaCry is based on the security exploit EternalBlue developed by the U.S. National Security Agency. WannaCry was released by the hacker group The Shadow Brokers. The Shadow Brokers announced that they provide cybercriminals with the opportunity to purchase paid subscription services allowing them to access various exploits and data stolen from important organizations. The hacking group claims to have data from Russian, North Korean, Iranian, and Chinese nuclear weapons, as well as data from the Swift banking network. Thus, shortly, we may witness the increasing popularity of a new Web-based service, namely, malware-as-a-service. The purpose of this article is to examine the history of malware-as-a-service (Section 2), the ecosystem of malware-as-a-service (Section 3), and the state of the art and the future of malware-as-a-service (Section 4). Finally, we draw a conclusion (Section 5).</span></p><p style="box-sizing:border-box;margin:0px 0px 1em;padding:0px;border:0px;line-height:inherit;vertical-align:baseline">Read on:-</p><a href="http://resources.infosecinstitute.com/malware-as-a-service/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+infosecResources+(InfoSec+Resources)" target="_blank">http://resources.<wbr>infosecinstitute.com/malware-<wbr>as-a-service/?utm_source=<wbr>feedburner&utm_medium=feed&<wbr>utm_campaign=Feed:+<wbr>infosecResources+(InfoSec+<wbr>Resources)</a></div><div><br><br><div><span><b>Ali Hussein</b></span></div><div><b style="background-color:rgba(255,255,255,0)">Hussein & Associates</b></div><div style="font-family:Helvetica;font-size:medium">+254 0713 601113 / 0770906375</div><div style="font-family:Helvetica;font-size:medium"><br></div><div><p style="margin:0in 0in 0pt"><span style="background-color:rgba(255,255,255,0)">Twitter: @AliHKassim</span></p><span style="background-color:rgba(255,255,255,0)"><font></font></span><p style="margin:0in 0in 0pt"><span style="background-color:rgba(255,255,255,0)">Skype: abu-jomo</span></p><p style="margin:0in 0in 0pt"><span style="background-color:rgba(255,255,255,0)">LinkedIn: <a href="http://ke.linkedin.com/in/alihkassim" target="_blank">http://ke.linkedin.<wbr>com/in/alihkassim</a><a href="http://ke.linkedin.com/in/alihkassim" target="_blank"><span style="text-decoration:none"></span></a></span></p><span style="background-color:rgba(255,255,255,0)"><font></font></span><p style="margin:0in 0in 0pt"></p><font><span style="background-color:rgba(255,255,255,0)">Blog: <a href="http://www.alyhussein.com/" target="_blank">www.alyhussein.com</a></span><br></font></div><div><span><br></span></div><div>"Discovery consists in seeing what everyone else has seen and thinking what no one else has thought". ~ Albert Szent-Györgyi</div><div><span><br></span></div>Sent from my iPad</div></div><br>______________________________<wbr>_________________<br>
kictanet mailing list<br>
<a href="mailto:kictanet@lists.kictanet.or.ke">kictanet@lists.kictanet.or.ke</a><br>
<a href="https://lists.kictanet.or.ke/mailman/listinfo/kictanet" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/<wbr>mailman/listinfo/kictanet</a><br>
Twitter: <a href="http://twitter.com/kictanet" rel="noreferrer" target="_blank">http://twitter.com/kictanet</a><br>
Facebook: <a href="https://www.facebook.com/KICTANet/" rel="noreferrer" target="_blank">https://www.facebook.com/<wbr>KICTANet/</a><br>
<br>
Unsubscribe or change your options at <a href="https://lists.kictanet.or.ke/mailman/options/kictanet/fmwangangi1%40gmail.com" rel="noreferrer" target="_blank">https://lists.kictanet.or.ke/<wbr>mailman/options/kictanet/<wbr>fmwangangi1%40gmail.com</a><br>
<br>
The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform for people and institutions interested and involved in ICT policy and regulation. The network aims to act as a catalyst for reform in the ICT sector in support of the national aim of ICT enabled growth and development.<br>
<br>
KICTANetiquette : Adhere to the same standards of acceptable behaviors online that you follow in real life: respect people's times and bandwidth, share knowledge, don't flame or abuse or personalize, respect privacy, do not spam, do not market your wares or qualifications.<br></blockquote></div></div>