"I am appalled and outraged by the heinous murder yesterday of six courageous humanitarians in South Sudan," Owusu said Sunday.
"These attacks against aid workers and aid assets are utterly reprehensible," said Mr. Owusu. "They not only put the lives of aid workers at risk, they also threaten the lives of thousands of South Sudanese who rely on our assistance for their survival.
He said the ambush comes at a time when humanitarian needs have reached an unprecedented level in the troubled country.
A South Sudanese refugee carries a relief box in Uganda.
The six slain aid workers represent the highest number of aid workers killed in a single incident since the South Sudan conflict began, according to a statement released by the UN's Office for the Coordination of Humanitarian Affairs.
The agency said at least 79 aid workers have been killed in South Sudan since its civil war began in December 2013.
The Petya ransomware makes a computer unusable until a ransom is paid One of the strange features of cybercrime is how much of it is public. A quick search will turn up forums and sites where stolen goods, credit cards and data are openly traded. But a glance into those places may not give you much idea about what is going on. "Everyone can join as long as you speak Russian," said Anton, a malware researcher at security firm SentinelOne, who has inhabited this underground world for more than 20 years. "By Russian I mean the USSR, so there is Ukrainians, there is Kazakhstan, there is Belarus. The Romanians are doing all the dirty work like spam and maintenance so they are not really involved in developing malware," he said. "But, today, is it mainly Russian? Yes." Those vibrant underground marketplaces have a long history and Anton adds that he tracks the malware makers to gain insights into what they might do next. "I was there from the very early stages,&q…
Activists have circulated amateur videos showing women being beaten
leading Shia Muslim cleric has told his followers to retaliate if women
are attacked, in a warning to the country's security forces.
In a sermon delivered at Friday prayers Sheikh Isa Qassim said: "Whoever you see abusing a woman, crush him."
The outburst has added to growing tension in the Gulf island state.
Shia protesters have faced the brunt of the security
crackdown un the past year, as the Sunni monarchy attempts to cope with
their demands for reform.
Activists have highlighted and circulated amateur videos
showing women being beaten and arrested by male security officers since
protests erupted in the capital Manama in February.
In a passionate and angry sermon, a video of which has been
seen by the BBC, Sheikh Qassim said on Friday: "Let us die for our
"How do they who do this to people expect the people t…
Cybersecurity predictions for 2016: How are they doing?
Like death and taxes, few things are more certain than the annual deluge of cybersecurity breaches, which shows no sign of abating despite the best efforts of the 'good guys' -- the security industry, CSIOs, government bodies, 'white hat' hackers, academics and others. Another fixture in the tech calendar is a spate of articles around the turn of every year that attempt to predict how the cybersecurity landscape will change over the next 12 months.
At the beginning of 2016, ZDNet's sister site Tech Pro Research examined 244 cybersecurity predictions for 2016 from 38 organisations, and assigned them among 22 emergent categories (occasionally splitting a prediction among two or three categories). The results were as follows:
Predictions from: A10 Networks, Appriver, AT&T, BAE Systems, Blue Coat, DataVisor, DomainTools, Experian, FireEye, Forrester, Fortinet, Hexis Cyber Solutions, HyTrust, IBM, Imperva, Kasp…