Cyber Attacks

Kenyan Small Businesses Experience 47% Increase in Cyber Attacks

When a small business owner is juggling production economics, financial reporting, and marketing, cybersecurity might seem complicated and, at times, pointless. Cybercriminals, on the other hand, are taking advantage of this lack of concern for IT security. Researchers from Kaspersky compared the dynamics of assaults on small and medium-sized firms between January and April 2022…

Sophos
| |

Sophos Named a Leader in 2022 KuppingerCole Leadership Compass for Endpoint Protection, Detection and Response

Sophos, a global leader in next-generation cybersecurity, today announced it has been named a leader in the 2022 KuppingerCole Leadership Compass for Endpoint Protection, Detection and Response. It is commended as an Overall Leader, sweeping all product, innovation and market leadership ratings. “An increasing number of organizations are being hit with ransomware, and the average ransom payment…

security

How to add an extra layer of security to your digital business

Cybersecurity has become a requirement in the digital age, when everything is digital. Data breaches and cyberattacks have occurred in both small and large firms on occasion, raising awareness regarding cybersecurity for businesses. If you use the internet to manage your organization, cybersecurity is an absolute essential. There is no need to invest a lot…

mobile workforce

SA businesses have more mobile workforces now – which means a greater need for cloud security amidst uptick in cyberattacks

Cape Town, South Africa, 4 May 2022 – The reality of today’s world is that employees are more mobile than ever, which means that their data is spread across more environments than ever before. Hybrid work is now cemented as the forever work style for many South African businesses, but with that flexibility comes a new…

android privacy
|

These Android features will assist you in maintaining your digital privacy.

Android and privacy haven’t always gone hand in hand. The majority of Google’s revenues still come from its data-driven advertising business, which is primarily reliant on user data, much of it acquired directly from Android users. By incorporating a variety of security safeguards and privacy protections into the software, Google now provides its users more…

privacy

Privacy remains a huge issue in the online learning world

In light of recent developments and the resulting circumstance posed by the pandemic in 2020, many schools and institutions are planning to switch, and some have already switched, to online learning, teaching, conferencing, and meetings, resulting in an increase in users of conference platforms such as Zoom, and Google meet. More concerns should be raised…

BlackCat ransomware

Cybersecurity: BlackCat Ransomware Attacks Over 60 Companies Worldwide

The FBI has issued a warning about the BlackCat ransomware-as-a-service (RaaS), which it claims has victimized at least 60 entities worldwide as of March 2022, since its discovery last November. The ransomware, also known as ALPHV and Noberus, is notable for being the first malware written in the Rust programming language, which is known to…

Cryptocurrency Scam
|

How to Protect Yourself From Cryptocurrency Scams in South Africa

In the daily rush for digital gold, more people are attempting to make money from cryptocurrencies. As a result of the insatiable demand for cryptocurrency, the number of criminals and con artists has also increased. The world appears to have gone ‘crypto-crazy.’ The popularity of digital currencies such as bitcoin, Monero, Ethereum, and even Dogecoin…

cybersecurity

4 Sure-Fire Ways to Protect Your Remote Work Environment from Cybersecurity Threats

Threats to cybersecurity are at an all-time high. With more companies adopting hybrid work models, it’s more important than ever to educate employees on the many cybersecurity dangers that come with working remotely. Employees who work from home offer a bigger security risk than those who operate in an office in a hybrid work environment….

Sophos

Red Flag for Ransomware: Attackers Are Using the Log4Shell Vulnerability to Deliver Backdoors to Virtual Servers, Sophos Research Shows

OXFORD, U.K. – March 31, 2022 – Sophos, a global leader in next-generation cybersecurity, has released findings on how attackers are using the Log4Shell vulnerability to deliver backdoors and profiling scripts to unpatched VMware Horizon servers, paving the way for persistent access and future ransomware attacks. A new technical paper, “Horde of Miner Bots and Backdoors Leveraged Log4J to…

Shujaa

Kenya’s New Cyber Shujaa Program To Equip 2,000 Youth

A cyber training project has been launched by USIU-Africa, Kenya Bankers Association, and Serianu. The program will train 2,000 people, bolstering Kenya’s cyber security capabilities. The training program, dubbed Cyber Shujaa, is unique in that it develops and implements a standardized cybersecurity employment framework. It acts as a link between industry and educational institutions. It…

McAfee Cloud data security

McAfee Enterprise’s former cloud division launches as new entity – Skyhigh Security

CAPE TOWN, SOUTH AFRICA – The launch of Skyhigh Security has been announced this week in South Africa. This is the second new company formed from the splitting of McAfee Enterprise into two separate entities – Trellix and Skyhigh Security – to better focus on the very distinct markets of Extended Detection and Response and the…

sophos dating

Crypto-trading Scam Demands Thousands of Dollars in Fake “Profit Tax” To Unlock Victims’ Accounts, Sophos Finds

Sophos, a global leader in next-generation cybersecurity, has released new insight into an international cryptocurrency trading scam called CryptoRom that targets iPhone and Android users through popular dating apps, such as Bumble and Tinder. The new research, “CryptoRom Swindlers Continue to Target Vulnerable iPhone/Android Users,” is based on first hand stories and content shared with Sophos…

Ransomware is the Biggest Threat to Your Organisation. Here’s Why

Ransomware is the Biggest Threat to Your Organisation. Here’s Why

Ransomware is becoming more dangerous and expensive all the time, and it has affected nearly every industry and geography. Nobody is safe from the threat. According to Fortinet’s global ransomware survey, 67 percent of organizations have experienced a ransomware attack. Worse, nearly half of those polled said they had been targeted more than once, and…

Cybersecurity Mistakes

Many Startups are Guilty of These 6 Cybersecurity Mistakes

Some of today’s most successful businesses began as startups. They usually begin with a brilliant idea or a new technology that promises to solve a problem and force us to reconsider how we do business. The African region is no stranger to startups; according to reports, African startups raised nearly $5 billion in total estimated…

kids security

7 Security Best Practices to Keep Your Kids Safe Online

Providing children with the skills they need to protect themselves online can be extremely beneficial to families. Kaspersky Lab, a cybersecurity and digital privacy company, shares seven digital practices that parents can teach their children. To survive in today’s Internet world, everyone requires certain skills. While adults typically learn these skills as new technologies emerge,…

Sophos
|

Sophos Research Details How Conti Gang, Karma Dual Ransomware Attack Hold Business Hostage

Sophos, a global leader in next-generation cybersecurity, today released findings of a dual ransomware attack where extortion notes left by Karma ransomware operators were encrypted 24 hours later by Conti, another ransomware gang that was in the target’s network at the same time. Sophos details the dual attacks in the article, “Conti and Karma Actors Attack Healthcare…

Tokenization Beyond Payments

Tokenization Beyond Payments: Unlocking New Fintech Product Opportunities

Tokenization is a ground-breaking technology development that goes beyond standard payments and has the power to totally change a variety of different industries. Tokenization is the process of converting private information into unique, non-private tokens that faithfully represent the original information. By preventing unauthorised use and prying eyes from accessing confidential information, this method improves…

Cybersecurity

The Real Reason Why Women Are Marginalized in Cybersecurity

Cybersecurity is one of the industries that suffers from significant bias and gender stereotypes. This field is becoming increasingly important in our digital world, and as a result, it offers a variety of rewarding career paths and opportunities. However, there are still significant barriers and misperceptions that lead women to believe that a career in…

Mobile Malware Attacks

Mobile Malware Attacks in Africa are Declining – Why Isn’t It a Good Thing?

While analyzing the threat landscape of African countries, Kaspersky experts observed a steady decline in mobile device attacks in the region, as cybercriminals concentrated their efforts to focus on more complicated, dangerous, and profitable threats. These and other findings are included in Kaspersky’s report, Mobile Threats in 2021. Overall, South African users faced 38% fewer…

Social Media

7 Best Practices to Keep Your Social Media Safe & Private

For an organization or individual, social media offers a plethora of opportunities to promote and expand a brand. Social media, a powerful form of communication that uses the internet, can provide any organization with a strong global presence. Most businesses believe they need a social media presence because these platforms and apps have billions of…

Report: Africa’s average mobile fraud rate reached 16.4% in 2021

Report: Africa’s average mobile fraud rate reached 16.4% in 2021

Payment structure narratives are changing as a result of technological advancements. Naturally, this convenience increases the risk of payment fraud. Each new payment method carries its own set of risks. Evina, a mobile anti-fraud specialist, examined the prevalence and evolution of this threat in 2021, with a focus on the African continent and the Middle…

Google

Google announces 2-Step Verification auto enrollments to protect internet users

Google has announced the expansion of its two-step verification (2SV) process for log-ins to improve account security after its newly introduced two-step verification initiative saw a 50% drop in account breaches for 150 million Gmail and 2 million YouTube creators accounts under the 2SV initiative. The 2SV introduces the use of mobile phones to confirm…

cybersecurity hacks

How business owners can leverage cybersecurity hacks from South Africa

Because we have no other option, South Africans have grown accustomed to dealing with crime. Various sources rank South Africa near the top of lists of countries with the highest crime rates in the world. If you are a South African or live in South Africa, you most likely take a variety of precautions at…

Web3 adoption crypto

Nestcoin secures $6.5m pre-seed to reinforce crypto and Web3 adoption in Africa

Globally, cryptocurrency industry funding has been increasing rapidly in recent years. Crypto startups raised more than $27 billion in venture capital last year alone, which is slightly more than the previous ten years combined. Moreover, despite a drop in the price of cryptocurrencies, American venture capital firm Andreessen Horowitz’s crypto arm launched a $2.2 billion…

ransomware

Integrating robust data backup into your ransomware defence strategy

It is well known that ransomware attacks are on the rise, and businesses must be realistic about what this means for their security. In recent years, the number of entry points into IT systems that attackers can exploit has increased dramatically. According to the FBI, cybercrime has increased by 300 percent during the pandemic as…

cybersecurity

How the pandemic is affecting cybersecurity

Even before the pandemic, businesses had begun to put in place elements to manage distributed employees, such as corporate remote desktop or virtual private networking (VPN) capabilities. This, however, was not done on the scale or at the rate required to manage the disruption caused by COVID-19. Companies were suddenly confronted with an influx of…

Data Management

4 Top Trends That Will Shape the Data Management Landscape in 2022

This year, the world is a very different place than it was a few years ago. Much has changed, not only in terms of available technologies, but also in terms of how businesses use technology and how they must adapt to a fully remote or hybrid working environment. This has altered how data is used,…

Here’s how smart contracts can eradicate fraud and fix Africa’s poor service culture
|

Here’s how smart contracts can eradicate fraud and fix Africa’s poor service culture

If you’re new to the world of blockchain and crypto asset management, the term “smart contracts” may sound a little complicated. But, if “smart contracts” are the foundation upon which Defi will work or will invariably work, it only makes sense for everyone to understand what they are. Understanding the origins of smart contracts is…