Quick Reads

MP Njoki calls for thorough investigations into the murder of a 3- year old girl

Bahati MP Irene Njoki has called for thorough investigations into an incident where a three-year-old girl was murdered in Lanet. Elsie Waithera met her death in a cold blooded at Nnga’nga trading centre in Lanet-Umoja Ward. “I condemn in the strongest terms possible the cold-blooded murder of three-year-old Elsie Waithera at Nnga’nga trading center in […]

Educationist’s message of hope to students who did not meet University cut mark

Students who do not make it to Universities have been urged to enroll in Technical Training Institutions, middle level colleges and further their studies. Educationists have noted that technical courses are key towards achieving industrialization in the country. Addressing journalists at the newly opened Nakuru International College along Kenyatta Avenue, Deputy Principal Stephen Kimetto urged […]

Musuruve joins UDA’s Disability League

UDA Party has received former ODM nominated Senator Dr. Getrude Musuruve to the party’s disability league. Dr. Musuruve, who recently joined UDA, promised to champion issues of People Living with Disability through the League. She was received into the league by the Party’s Director of Programmes and Partnerships Mr Daniel Kiptoo. Others present were Ms. […]

Retired police Chief Kingori Mwangi dies

Former police boss Kingori Mwangi has died at a Nairobi hospital where he was undergoing treatment, his family announced on Sunday, February 11. Mwangi, who retired from the public service in 2020, had a distinguished career in the National Police Service. He served as a police chief in Nairobi, Coast and Western regions, as well […]

Understanding different forms of cyber crime

CYBER CRIME Different forms of Cyber Crimes: Hacking: It is a form of crime in which criminal’s access personal or sensitive information stored in systems database belonging to any individual or organization from a remote location. The actual owner may not be aware that his confidential information is being accessed by other person. The criminals […]