cybersecurity

4 Sure-Fire Ways to Protect Your Remote Work Environment from Cybersecurity Threats

Threats to cybersecurity are at an all-time high. With more companies adopting hybrid work models, it’s more important than ever to educate employees on the many cybersecurity dangers that come with working remotely. Employees who work from home offer a bigger security risk than those who operate in an office in a hybrid work environment….

Sophos

Red Flag for Ransomware: Attackers Are Using the Log4Shell Vulnerability to Deliver Backdoors to Virtual Servers, Sophos Research Shows

OXFORD, U.K. – March 31, 2022 – Sophos, a global leader in next-generation cybersecurity, has released findings on how attackers are using the Log4Shell vulnerability to deliver backdoors and profiling scripts to unpatched VMware Horizon servers, paving the way for persistent access and future ransomware attacks. A new technical paper, “Horde of Miner Bots and Backdoors Leveraged Log4J to…

Shujaa

Kenya’s New Cyber Shujaa Program To Equip 2,000 Youth

A cyber training project has been launched by USIU-Africa, Kenya Bankers Association, and Serianu. The program will train 2,000 people, bolstering Kenya’s cyber security capabilities. The training program, dubbed Cyber Shujaa, is unique in that it develops and implements a standardized cybersecurity employment framework. It acts as a link between industry and educational institutions. It…

McAfee Cloud data security

McAfee Enterprise’s former cloud division launches as new entity – Skyhigh Security

CAPE TOWN, SOUTH AFRICA – The launch of Skyhigh Security has been announced this week in South Africa. This is the second new company formed from the splitting of McAfee Enterprise into two separate entities – Trellix and Skyhigh Security – to better focus on the very distinct markets of Extended Detection and Response and the…

sophos dating

Crypto-trading Scam Demands Thousands of Dollars in Fake “Profit Tax” To Unlock Victims’ Accounts, Sophos Finds

Sophos, a global leader in next-generation cybersecurity, has released new insight into an international cryptocurrency trading scam called CryptoRom that targets iPhone and Android users through popular dating apps, such as Bumble and Tinder. The new research, “CryptoRom Swindlers Continue to Target Vulnerable iPhone/Android Users,” is based on first hand stories and content shared with Sophos…

Ransomware is the Biggest Threat to Your Organisation. Here’s Why

Ransomware is the Biggest Threat to Your Organisation. Here’s Why

Ransomware is becoming more dangerous and expensive all the time, and it has affected nearly every industry and geography. Nobody is safe from the threat. According to Fortinet’s global ransomware survey, 67 percent of organizations have experienced a ransomware attack. Worse, nearly half of those polled said they had been targeted more than once, and…

Cybersecurity Mistakes

Many Startups are Guilty of These 6 Cybersecurity Mistakes

Some of today’s most successful businesses began as startups. They usually begin with a brilliant idea or a new technology that promises to solve a problem and force us to reconsider how we do business. The African region is no stranger to startups; according to reports, African startups raised nearly $5 billion in total estimated…

kids security

7 Security Best Practices to Keep Your Kids Safe Online

Providing children with the skills they need to protect themselves online can be extremely beneficial to families. Kaspersky Lab, a cybersecurity and digital privacy company, shares seven digital practices that parents can teach their children. To survive in today’s Internet world, everyone requires certain skills. While adults typically learn these skills as new technologies emerge,…

Sophos
|

Sophos Research Details How Conti Gang, Karma Dual Ransomware Attack Hold Business Hostage

Sophos, a global leader in next-generation cybersecurity, today released findings of a dual ransomware attack where extortion notes left by Karma ransomware operators were encrypted 24 hours later by Conti, another ransomware gang that was in the target’s network at the same time. Sophos details the dual attacks in the article, “Conti and Karma Actors Attack Healthcare…

Tokenization Beyond Payments

Tokenization Beyond Payments: Unlocking New Fintech Product Opportunities

Tokenization is a ground-breaking technology development that goes beyond standard payments and has the power to totally change a variety of different industries. Tokenization is the process of converting private information into unique, non-private tokens that faithfully represent the original information. By preventing unauthorised use and prying eyes from accessing confidential information, this method improves…

Cybersecurity

The Real Reason Why Women Are Marginalized in Cybersecurity

Cybersecurity is one of the industries that suffers from significant bias and gender stereotypes. This field is becoming increasingly important in our digital world, and as a result, it offers a variety of rewarding career paths and opportunities. However, there are still significant barriers and misperceptions that lead women to believe that a career in…

Mobile Malware Attacks

Mobile Malware Attacks in Africa are Declining – Why Isn’t It a Good Thing?

While analyzing the threat landscape of African countries, Kaspersky experts observed a steady decline in mobile device attacks in the region, as cybercriminals concentrated their efforts to focus on more complicated, dangerous, and profitable threats. These and other findings are included in Kaspersky’s report, Mobile Threats in 2021. Overall, South African users faced 38% fewer…

Social Media

7 Best Practices to Keep Your Social Media Safe & Private

For an organization or individual, social media offers a plethora of opportunities to promote and expand a brand. Social media, a powerful form of communication that uses the internet, can provide any organization with a strong global presence. Most businesses believe they need a social media presence because these platforms and apps have billions of…

Report: Africa’s average mobile fraud rate reached 16.4% in 2021

Report: Africa’s average mobile fraud rate reached 16.4% in 2021

Payment structure narratives are changing as a result of technological advancements. Naturally, this convenience increases the risk of payment fraud. Each new payment method carries its own set of risks. Evina, a mobile anti-fraud specialist, examined the prevalence and evolution of this threat in 2021, with a focus on the African continent and the Middle…

Google

Google announces 2-Step Verification auto enrollments to protect internet users

Google has announced the expansion of its two-step verification (2SV) process for log-ins to improve account security after its newly introduced two-step verification initiative saw a 50% drop in account breaches for 150 million Gmail and 2 million YouTube creators accounts under the 2SV initiative. The 2SV introduces the use of mobile phones to confirm…

cybersecurity hacks

How business owners can leverage cybersecurity hacks from South Africa

Because we have no other option, South Africans have grown accustomed to dealing with crime. Various sources rank South Africa near the top of lists of countries with the highest crime rates in the world. If you are a South African or live in South Africa, you most likely take a variety of precautions at…

Web3 adoption crypto

Nestcoin secures $6.5m pre-seed to reinforce crypto and Web3 adoption in Africa

Globally, cryptocurrency industry funding has been increasing rapidly in recent years. Crypto startups raised more than $27 billion in venture capital last year alone, which is slightly more than the previous ten years combined. Moreover, despite a drop in the price of cryptocurrencies, American venture capital firm Andreessen Horowitz’s crypto arm launched a $2.2 billion…

ransomware

Integrating robust data backup into your ransomware defence strategy

It is well known that ransomware attacks are on the rise, and businesses must be realistic about what this means for their security. In recent years, the number of entry points into IT systems that attackers can exploit has increased dramatically. According to the FBI, cybercrime has increased by 300 percent during the pandemic as…

cybersecurity

How the pandemic is affecting cybersecurity

Even before the pandemic, businesses had begun to put in place elements to manage distributed employees, such as corporate remote desktop or virtual private networking (VPN) capabilities. This, however, was not done on the scale or at the rate required to manage the disruption caused by COVID-19. Companies were suddenly confronted with an influx of…

Data Management

4 Top Trends That Will Shape the Data Management Landscape in 2022

This year, the world is a very different place than it was a few years ago. Much has changed, not only in terms of available technologies, but also in terms of how businesses use technology and how they must adapt to a fully remote or hybrid working environment. This has altered how data is used,…

Here’s how smart contracts can eradicate fraud and fix Africa’s poor service culture
|

Here’s how smart contracts can eradicate fraud and fix Africa’s poor service culture

If you’re new to the world of blockchain and crypto asset management, the term “smart contracts” may sound a little complicated. But, if “smart contracts” are the foundation upon which Defi will work or will invariably work, it only makes sense for everyone to understand what they are. Understanding the origins of smart contracts is…

Fraud Strategies

5 Anti-Fraud Strategies for Every Financial Institution

The rise of digital banking and e-commerce, fueled by the COVID-19 pandemic, creates an ideal environment for fraudsters and money launderers to perpetrate crimes anonymously. Clive Gungudoo, MoData’s Director of Financial Crimes and Risk Management, presents five key measures that organizations must use to protect their digital customer experience. Clive Gungudoo’s interest is educating and…

Red Cross

Cybersecurity: Red Cross Attack Exposes Data of Over 515,000 Vunerable People

According to the International Committee of the Red Cross, which is best known for assisting war victims, hackers broke into servers hosting its data and gained access to personal and confidential information on over 500,000 vulnerable people. According to the Geneva-based agency, the hack this week by unknown attackers damaged data on approximately 515,000 people,…

Malware, Check Point Research

December 2021’s Most Wanted Malware: Trickbot, Emotet and the Log4j plague

In Check Point Research of January 12, 2022, the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published its latest Global Threat Index for December 2021. In a month that saw the Apache Log4j vulnerability sweep the internet, researchers reported that Trickbot is still the most prevalent malware, albeit at a slightly…

Mozilla

Mozilla Launches Facebook Pixel Hunt to Reveal How You’re Tracked Online

Mozilla researchers announced the commencement of their “Facebook Pixel Hunt” investigation this week, which aims to follow the company’s massive web-wide tracking network and scrutinize the data it collects on users. This study, as the name implies, focuses on a piece of tracking technology known as the “Facebook pixel.” You’ve probably visited a site that…

Fiber network

Cybersecurity: 4 Fiber Predictions That Will Shape South Africa in 2022

If there’s one thing that the year 2021 has taught us, it’s that nothing can be taken for granted. The local fibre landscape is rapidly changing: as a result of the pandemic, changes in home and workplace behavior are driving up demand for high-quality, dependable connectivity, while recent consolidation among Fibre Network Operators (FNOs) and…

LastPass password

LastPass users report accounts were likely compromised

Some LastPass password manager users revealed this week that they received emails from LastPass stating that logins to their accounts using the master password had been blocked. The first of these reports appeared on Hacker News. LastPass emails indicate that a login attempt was unsuccessful. The login attempt came from Brazil in the case of…

smart home home security

Cybercriminals can invade a smart home. Here’s how

People adore smart devices but are unconcerned about their security What if “Home Alone” had been released in theaters today? Instead of peering through the doorway, Kevin would most likely use his smartphone to monitor the house via smart cameras. In addition, instead of glass marbles, he could use a robot vacuum to attack the…