Headlines
  • After talks in Washington on Tuesday that US Secretary of State Marco Rubio described as a "historic opportunity" for peace, Israel and Lebanon agreed to hold direct talks.
  • Iran talks could resume "over the next two days," according to US President Donald Trump, after the failure of last weekend's first round in Pakistan.
  • Six merchant ships turned around after "direction from US forces," according to the US, and no ships were able to pass through the blockade in the first 24 hours.
  • According to the Lebanese Ministry of Public Health, there were at least 35 deaths and 159 injuries in Lebanon on Tuesday.
  • The southern Lebanon district of Bint Jbeil has been hit by an Israeli airstrike.
  • "The short-term authorization permitting the sale of Iranian oil already stranded at sea is set to expire in a few days and will not be renewed," according to the US Treasury Department.

More Details

The Increasing Menace Of Mobile Money In Cameroon

Saron Obia ~Cyber Security Expert

Mobile money has become a global menace. In Cameroon cybercriminals, as well as nonconventional actors, use this medium to extort money from citizens, the latest is now a chanted song called ‘support the struggle’ still known as the ‘Anglophone Crisis’. With the cheap rate at which SIM cards are sold and poor identification methods in some countries and Cameroon in particular which mobile operating companies encounter a serious challenge is stopping this deviant behavior of youngsters.

Criminals purchase a phone (Choroko), or smartphones for international scams from the black market (Avenue Kennedy, Yaoundé) to perpetrate crimes and later resale or damage. When they get this phone, the buy SIM cards from commercial agents and identify the SIM with the agent’s identity card, claiming to have forgotten theirs (identity theft), which they use to perpetrate crimes. Others use the attestation of lost to identify SIM cards and create mobile money accounts use for their hits.

Criminal investigations are often challenging due to negligence and inadequate cybersecurity measures by mobile operating companies and law enforcement officers. Poor authentication methods and inadequate education for those involved in the battle against non-conventional crimes

Moreover, they send messages (SMS) to any cell number requesting the person to update or change his mobile money personal identifying number (PIN) following a security modification at the operation center. Code is usually given for the pin to be sent when validated the account is automatically empty by the criminal monitoring the victim from his laptop or smartphone. Some request victims (Jk, Maga, and Mugu) to effectuate mobile money transactions to their number following a game the won, as the number of the latter was shortlisted by the mobile agency. If the latter does this operation using a commercial agent (working for a mobile operating company) along the street, the account is immediately emptied.

Cybercriminal Mobile Money (MOMO) Pattern

Criminal investigations are often challenging due to negligence and inadequate cybersecurity measures by mobile operating companies and law enforcement officers. Poor authentication methods and inadequate education for those involved in the battle against non-conventional crimes. As such, police officers turn to track the wrong person, while the criminals using different identities go scot-free. A commissioner or an individual not aware of his name, phone number (cloned) and residence gotten from social media, is been used by a cybercriminal may be under investigation and even shortlisted as wanted individuals.

In conclusion, the government needs a team of cyber warriors, which constitute of hackers (ethical hackers), cybersecurity consultants, bug bounty hunters and also work with students following security course in universities as well as lay private institutions to combat this emerging challenge that ruins banks, mobile operating companies, and breach into strategic state infrastructures, as the National Agency for Information and Communication Technologies (ANTIC) in 2015 revealed that 90 percent of the software and operating systems used in Cameroon have been hacked~Cameroon News Agency (CNA)

Barbado da Terceira Dog Breed

The Azores islands of Portugal are the origins of the Barbado da Terceira dog breed.They are medium-sized guard and herding dogs. However, they have a friendly temperament and intelligence.
Read More

Web Application Firewalls (WAFs)

By filtering, tracking, and preventing any dangerous HTTP/S traffic that could enter the web application, Web Application Firewalls (WAFs) safeguards the web application.
Read More

Toy Poodle

A small version of the Standard model is the Toy Poodle.The coats of Toy Poodles are curly.Apricot, black, blue, brown, cream, red, brown, silver, white, and gray are the colors of toy poodles.
Read More

Authentication

The process of confirming a person’s identity before granting them access to a system, application, or resource is known as user authentication. Systems use a variety of credentials, such as user IDs, passwords or biometrics to verify that a user is genuine.
Read More

UN Security Council Meets to Discuss Cooperation between UN and European Union

Jamal Fares Alrowaiei, Permanent Representative of Bahrain to the United Nations and President of the United Nations Security Council for the month of April, chairs the UN Security Council meeting on cooperation between the United Nations and European Union, under regional and subregional organizations, in maintaining international peace and security.
Read More

Subscribe Our You Tube Channel

Fighting Fake News

Fighting Lies




Related Article

US to Set Up Philippines Fuel…

Washington is planning a fuel depot in the southern Philippines that could support humanitarian and ...
April 11, 2026

Japan’s Combat Role in Philippines War…

Japan sending combat troops to participate in upcoming exercises in the Philippines is a signal of a ...
April 9, 2026

PNG-Australia Defense Treaty Creates Jobs, Risks…

Six months after Papua New Guinea and Australia signed a bilateral defense treaty, public opinion in ...
April 8, 2026

China-US Competition for Rare Earths Sparks…

A U.S. plan to potentially mine an area of Pacific seabed roughly the size of Nevada near two U.S. t ...
April 2, 2026

North Korean Hackers Offer $70,000 Per…

Cybersecurity engineer Toufik Airane was approached by a North Korean hacker who offered him a small ...
March 27, 2026

Vietnam Protests China’s Development of Disputed…

Vietnam has condemned China’s land reclamation activities at Antelope reef in the disputed Paracel ...
March 24, 2026

Other Article

Bizzare News

In North Carolina,12-Foot Alligator Found Perched…

According to social media photos, an alligator was seen lounging on the porch of a house in coastal ...
April 15, 2026
Pet Corner

Barbado da Terceira Dog Breed

The Azores islands of Portugal are the origins of the Barbado da Terceira dog breed.They are medium- ...
Prevent Cyber Crime

Web Application Firewalls (WAFs)

By filtering, tracking, and preventing any dangerous HTTP/S traffic that could enter the web applica ...
Pick of the Day

Photo Opportunity for 2026 Heads of…

United Nations Secretary-General António Guterres attends a photo opportunity for the 2026 Heads of ...
Bizzare News

92 Year Old Japanese Woman Becomes…

Yoshie Watanabe, who was born on April 6, 1934, into a family of nine, is officially recognized by G ...
April 14, 2026
Pet Corner

Toy Poodle

A small version of the Standard model is the Toy Poodle.The coats of Toy Poodles are curly.Apricot, ...

Top