Skip to main content

Posts

Showing posts with the label February 04

Who is Matua Job Richard; The Chief Petitioner in NSSF Scandals.

#we_inform_the_uninformed . Job Richard Matua is the man who petitioned the Ministry of Gender, Labour and Social Development about Richard Byarugaba’s continued employment despite clocking 60 years. But who is Job Richard Matua? He identifies as an NRM Cadre and to show how serious he is, he wants to stand for National Vice Chairperson Central Executive Committee NRM Northern-Uganda a position that fell vacant after the death of former speaker Jacob Oulanyah. Matua is a former teacher of Biology. He has taught the subject for 14 years and his speciality was on the Biology practical paper. This is where he discovered that rearing rats for practicals can be a business since one of the specimens UNEB always sets for Advanced level students is a rat. Matua says each rat sells between 10,000/= to 20,000/= off season but during UNEB exams, one rat goes for 30,000/= to 50,000/=. He says that his friends Robert Musinguzi in Blessed Sacrament Kimanya and Aisha from St Peter’s SS Nsambya i

Is Your EV Charging Station Safe? New Security Vulnerabilities Uncovered.

#we_inform_the_uninformed . Two new security weaknesses discovered in several electric vehicle (EV) charging systems could be exploited to remotely shut down charging stations and even expose them to data and energy theft. The findings, which come from Israel-based SaiFlow, once again demonstrate the potential risks facing the EV charging infrastructure. The issues have been identified in version 1.6J of the Open Charge Point Protocol (OCPP) standard that uses WebSockets for communication between EV charging stations and the Charging Station Management System (CSMS) providers. The current version of OCPP is 2.0.1. “The OCPP standard doesn’t define how a CSMS should accept new connections from a charge point when there is already an active connection,” SaiFlow researchers Lionel Richard Saposnik and Doron Porat said. “The lack of a clear guideline for multiple active connections can be exploited by attackers to disrupt and hijack the connection between the charge point and t