Google removes an Android screen recording app that was discovered using a remote access Trojan to spy on users.

Google removes an Android screen recording app that was discovered using a remote access Trojan to spy on users.

A malicious Android software that had been downloaded onto more than 50,000 devices was recently withdrawn from the Play Store by Google. The program was first released by the developer in 2021, and a year later it was infested with malicious code, said the security company that found the trojan. The program may also extract…

Sophos
|

Data Encryption from Ransomware Reaches Highest Level in Four Years, Sophos’ Annual State of Ransomware Report Finds

Sophos, a global leader in innovating and delivering cybersecurity as a service, today released its annual “State of Ransomware 2023 ” report, which found that in 76% of ransomware attacks against surveyed organizations, adversaries succeeded in encrypting data. This is the highest rate of data encryption from ransomware since Sophos started issuing the report in 2020. The…

Cyber Threats

How AI Can Enhance Cybersecurity and Protect Your Business from Cyber Threats

Businesses rely largely on technology to carry out daily tasks in this digital age. However, there is a higher risk of cyber threats as a result of our growing reliance on technology. For businesses of all sizes, cybersecurity is a major worry since cyberattacks may lead to data breaches, financial losses, and even reputational damage. …

Google Begins Rolling Out Passkeys

As a more secure method of signing into apps and websites, Google has started to roll out Passkeys.

Google has finally started rolling out support for the passkeys authentication method, which it claims is more secure than ordinary passwords and even two-step verification (2SV), after over ten years of preparation and a year of declaring support for the same. A year ago, Apple, Google, and Microsoft jointly stated that they will start adopting…

Sophos
|

Six months After Launch Sophos’ Industry-First Vendor-Agnostic MDR Service Grows Customer Base by 33%

Sophos Adds Team of MDR Experts in Germany, Expanding Global Footprint of Security Operations Specialists Defenders Have Less Time to Defend; MDR Services Become Critical Cybersecurity Layer as Attacker Dwell Time Decreases, Says Sophos’ Annual Active Adversary Report Sophos, a global leader in innovating and delivering cybersecurity as a service, has announced that its industry-first…

Apple

Report: Criminals lock users out of their stolen iPhones using Apple’s recovery key.

iPhone users can reset their Apple ID password or restore access to their Apple ID account using Apple’s recovery key function. Now, a Wall Street Journal study demonstrates how thieves and cybercriminals can utilize Apple’s advanced security setting to lock a person out of a stolen iPhone. A thief can change the Apple ID password…

Sophos
|

93% of Organizations Find the Execution of Essential Security Operation Tasks Challenging, Sophos Survey Finds

Sophos, a global leader in innovating and delivering cybersecurity as a service, today published a new survey report, “The State of Cybersecurity 2023: The Business Impact of Adversaries on Defenders,” which found that, globally, 93% of organizations find the execution of some essential security operation tasks, such as threat hunting, challenging. These challenges also include…

Digital Twins

Cybersecurity in the Age of Digital Twins: Securing Virtual Replicas of Physical Systems

Recently, the digital transformation has continued to rebuild industries and redefine operational efficiencies. One of the most important innovations is the establishment of digital twins, a technology that provides organisations to create evolving, real-time virtual replicas of physical systems. From healthcare to manufacturing, urban planning to energy management, digital twins are transforming the method businesses…

Data Protection

How Data Protection Policy in Nigeria Is Evolving to Secure Customers

Technology advancement has increased the value of data, and many businesses are willing to invest in it. These data are obtained from customers directly or indirectly. When data is directly gathered, customers are often asked for their consent, and they typically provide it. In contrast, information that is gained inadvertently may be gathered through tracking or…

Sophos
|

Sophos Demonstrates How to Make ChatGPT a Cybersecurity Co-Pilot

Sophos, a global leader in innovating and delivering cybersecurity as a service, today released new research on how the cybersecurity industry can leverage GPT-3, the language model behind the now well-known ChatGPT framework, as a co-pilot to help defeat attackers. The latest report, “Applying AI Language Processing to Cyber Defenses,” details projects developed by Sophos…

Sophos
|

Sophos Endpoint Security Advancements Improve Cyberthreat Defenses and Streamline Management

Sophos, a global leader in innovating and delivering cybersecurity as a service, today introduced innovative advancements to its portfolio of industry-leading endpoint security offerings. New adaptive active adversary protection; Linux malware protection enhancements; account health check capabilities; an integrated zero trust network access (ZTNA) agent for Windows and macOS devices; and more improve frontline defenses against advanced cyberthreats and streamline endpoint…

Kaspersky phishing

Kaspersky: 7% of Nigerian Internet Users Affected by Phishing in 2022

In 2022, phishing affected 7% of Nigerian internet users, according to a statement released on Thursday by leading antivirus company Kaspersky. Phishing is the activity of sending emails or messages to people or businesses in an effort to get them to divulge sensitive information that will later be utilized for evil. According to Kaspersky analysts,…

Sophos
|

Sophos Expands Firewall Portfolio with Enterprise-Grade Appliances that Broaden Market Opportunities for Channel Partners

Sophos, a global leader in innovating and delivering cybersecurity as a service, today announced the expansion of its next-generation firewall portfolio with two new high-end, enterprise-grade XGS Series appliances. The new XGS 7500 and 8500 models provide unrivaled performance and protection for large enterprise and campus deployments, broadening market opportunities for the channel partners that serve them. “Large enterprises are under…

Sophos
|

Sophos Details First Fake Apps Found on Apple’s App Store Used by Cybercriminals for CryptoRom Schemes

 Sophos, a global leader in innovating and delivering cybersecurity as a service, today released new findings on CryptoRom scams—elaborate financial fraud schemes that prey on and trick dating app users into making fake cryptocurrency investments—in its latest report, “Fraudulent Trading Apps Sneak into Apple and Google App Stores.” The report details the first fake CryptoRom apps —Ace Pro and MBM_BitScan—…

Sophos
|

Sophos is the Top Ranked and Sole Leader in the Omdia Universe Report for Comprehensive XDR Solutions

 Sophos, a global leader in innovating and delivering cybersecurity as a service, today announced that its Sophos Intercept X Advanced with XDR solution has been named the top-ranked and sole leader in the Omdia Universe report for comprehensive extended detection and response (XDR) solutions. The global research company ranked Sophos’ product the highest in nearly all capabilities categories – excelling…

Average daily number of malicious files detected by Kaspersky security solutions from 2019 to 2022 (1st January – 31st October)

Cybercriminals attack users with 400,000 new malicious files daily – that is 5% more than in 2021

In 2022, Kaspersky’s detection systems discovered on average 400,000 malicious files distributed every day, indicating a 5% growth compared to 2021. The number of certain types of threats also escalated: for example, Kaspersky experts discovered the 181% increase in the proportion of ransomware detected daily. These and other findings are part of Kaspersky Security Bulletin…

Cyber defence

Cyber defence must be a top priority for South African Business

One Device to Rule Them All  Imagine an average professional working for your corporation or department, and his daily life – we’ll call him Mike. Mike wakes up and checks his social media and SMS notifications. Maybe he’ll search a news video and broadcast it onto his smart television while he dresses. Touching his phone…

Twitter
|

Twitter: Email Addresses of 200 Million Users Leaked in Data Hack

According to a security researcher, hackers obtained the email addresses of more than 200 million Twitter users and posted them on a hacking forum online on Wednesday. Alon Gal, co-founder of Israeli cybersecurity-monitoring company Hudson Rock, wrote on LinkedIn that the breach “will regrettably result in a lot of hacking, targeted phishing, and doxxing.” One…

shopping red flags

Online shopping red flags: How to spot a scam this festive season

It’s officially the holiday season, and for many of us, that means the countdown to “presents o’clock” – AKA December 25th is on. Real-life shops get crazy during the festive season, seeing more and more people choosing to hop online, point, click and proceed to checkout. Shopping online is also much easier now that more…

retail store ccompetitive edge

How to give your retail store a competitive edge

By supporting real-time decision-making, combining edge computing with digital signage improves the customer experience and boosts sales. Although in-store purchases continue to make up the bulk of retail sales, a tightening economic situation means it’s essential to maximise every opportunity to make a sale once a customer reaches your door. We also know that brick…

Cybersecurity Experts

5 Cybersecurity Experts Disrupting the Tech Ecosystem 5 African Countries

In recent years, Africa has witnessed a significant increase in technological advancements, with a burgeoning tech ecosystem gaining wide acceptance across the continent.  In the midst of this rapid growth, cybersecurity is seen as a critical concern which needs expertise and innovation to protect digital infrastructure and data integrity. Here, we shine a spotlight on…

Sophos
|

Sophos Launches Industry-First Managed Detection and Response (MDR) Service from an Endpoint Security Provider that Integrates Vendor Agnostic Telemetry

·         Introduces Sophos Marketplace and $1 Million Breach Protection Warranty ·         Sophos X-Ops Identifies LockBit 3.0 Similarities to BlackMatter; Attackers Use Pentesting and Credential Theft to Evade Detection, Requiring Specialized MDR Skills to Spot Them  Sophos, a global leader in innovating and delivering cybersecurity as a service, has announced the general availability of Sophos Managed Detection and Response (MDR) with…

Sophos
|

The Cloud is a Growing Target for Cyberattacks, A New Sophos Survey Finds

Sophos, a global leader in innovating and delivering cybersecurity as a service, today published findings of a new survey, “The Reality of SMB Cloud Security in 2022.” The survey found that, among Infrastructure as a Service (IaaS) users, 56% experienced an increase in the volume of attacks on their organization when compared to the previous…

Retail industry and Ransomware report by Sophos
|

Criminals “Follow the Money” by Commercializing Cybercrime, according to the Sophos 2023 Threat Report.

Sophos, a global leader in innovating and delivering cybersecurity as a service, today published its 2023 Threat Report. The report details how the cyberthreat landscape has reached a new level of commercialization and convenience for would-be attackers, with nearly all barriers to entry for committing cybercrime removed through the expansion of cybercrime-as-a-service. The report also addresses…

cybersecurity 5G
|

Tech trends – 5G, broadband, fintech, data privacy and cybersecurity risks – expected to be discussed at Africa Tech Festival

Trending topics in the African technology and telecommunications space include the rollout of 5G, the dire need for telecommunications infrastructure and access to broadband spectrum, the steady rise of the fintech sector despite global economic turbulence, the development of cybersecurity and privacy laws across the continent and the rising number of disputes that are driven…

Cyber Threats

How Businesses can prevent and Combat Cyber Threats

Online business may have its benefits, but there is also a greater chance of hoaxes and cyber threats. The credibility of your business could be negatively affected by a successful cyber-attack. Therefore, safeguarding your business against cyber-attack is a crucial concern. That if not prevented may require a reestablishment of the business. In the extreme scenarios, it may…

SHELT
|

SHELT Inaugurates Cyber Security Operations Centre Extension in Nigeria

SHELT has announced the opening of its very own SOC in Nigeria, where it will serve as a local extension to its overseas and already established 24/7 SOC operation. This launch comes amidst the growing need of SHELT’s Nigeria branch to step into serving the local clientele through a team that is locally present and…

Sophos
|

Sophos’ Industry-Leading MDR Service Launches Compatibility with Third-Party Cybersecurity Technologies

 Sophos, a global leader in innovating and delivering cybersecurity as a service, today launched new third-party security technology compatibilities with Sophos Managed Detection and Response (MDR) to better detect and remediate attacks with speed and precision across diverse customer and operating environments. The industry-leading service with more than 12,000 customers now integrates telemetry from third-party endpoint, firewall, cloud, identity, email, and…

WhatsApp

Report: A new Malicious WhatsApp mod is Targeting African Users

A new dangerous variant of the well-liked YoWhatsApp WhatsApp messaging mod was found by Kaspersky researchers. This mod spreads the infamous Triada mobile Trojan, which may download other Trojans, issue paid memberships, and even steal WhatsApp accounts. It is well-known for having functionality that the official software does not provide. In the past two months,…

REvil ransomware

Dismantling a Prolific Cybercriminal Empire: REvil Arrests and Reemergence

We’ve recently seen reports that the REvil ransomware gang is back online after the January 2022 arrests of several its members by Russian authorities claiming to dismantle the group and the November 2021 arrests of two members by U.S. authorities. While it remains to be seen if this re-emergence of REvil includes its most aggressive…