South Africa registers more than half a million coronavirus casesJason Burke in Johannesburgon August 2, 2020 at 3:25 pm

Infections rise following easing of lockdown as government struggles to retain public trustCoronavirus – latest updatesSee all our coronavirus coverageSouth Africa has registered more than half a million confirmed cases of Covid-19, health officials have said, as the government struggles to retain public trust amid allegations of widespread corruption, arbitrary decisions on restrictions and administrative incompetence.Africa’s most industrialised nation was widely praised for its early response to the pandemic but criticism has since mounted as a strict lockdown was eased. Continue reading…

Infections rise following easing of lockdown as government struggles to retain public trust

South Africa has registered more than half a million confirmed cases of Covid-19, health officials have said, as the government struggles to retain public trust amid allegations of widespread corruption, arbitrary decisions on restrictions and administrative incompetence.

Africa’s most industrialised nation was widely praised for its early response to the pandemic but criticism has since mounted as a strict lockdown was eased.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more