MENU

Posts Tagged ‘malware’

  • stage 4 load shedding

    Industroyer- The Malware That Could Leave You In Darkness

    June 22, 2017 • Features, Mining & Energy, Security, Top StoriesComments (0)

    Cyber-security firms ESET and Dragos have unearthed a new malware that can disrupt power grids leading to blackouts for days. The malware has been named Industroyer by ESET, while Dragos has termed it as CrashOverride in their respective analyses. Whatever be...

  • (Image Source: http://cdn.digisecrets.com)

    ESET researchers discover sophisticated and dangerous malware

    June 12, 2017 • Security, SponsoredComments Off on ESET researchers discover sophisticated and dangerous malware

    ESET researchers have discovered the biggest threat to industrial control systems since Stuxnet, Industroyer Industroyer is a sophisticated and extremely dangerous malware designed to disrupt critical industrial processes. ESET researchers analysed samples of...

  • (image: Yu Samoilov)

    Global Ransomware Attack: Outbreak Disrupts IT Systems Worldwide

    May 15, 2017 • Online & Social, Security, Sponsored, Top StoriesComments Off on Global Ransomware Attack: Outbreak Disrupts IT Systems Worldwide

    A new wave of ransomware known as “WannaCry” has spread across the globe and infected tens of thousands of computers. This ransomware propagates by exploiting a Microsoft Windows vulnerability in unpatched computers. According to Europol, more than...

  • Fortinet Security

    Mobile Advertising Trojans the Top Mobile Malware Threat in 2016

    March 2, 2017 • Security, Top StoriesComments Off on Mobile Advertising Trojans the Top Mobile Malware Threat in 2016

    In 2016 a total of 8.5 million malicious installations identified, seeing a near-threefold rise in mobile malware compared to 2015. This means that, in the space of just one year, a volume equivalent to 50% of all the malware detected in the previous 11 years...

  • Paul Williams Country Manager - SADC at Fortinet.

    Fortifying wireless security key to a robust network

    January 27, 2017 • Opinion, SecurityComments Off on Fortifying wireless security key to a robust network

    Most organizations think they have their security taken care of but ironically, CIOs today are not accounting for how their network is actually accessed. A single user may be logged on through multiple devices: a phone, a tablet, and a laptop. There could...

  • Kaspersky Lab’s Customer Survey 2016 reveals that 26% of internet users have no idea how malware ended up on their device.  (image: Charlie Fripp)

    Kaspersky Lab’s Consumer Security Risks Survey 2016 released

    November 21, 2016 • Security, Top StoriesComments Off on Kaspersky Lab’s Consumer Security Risks Survey 2016 released

    Malware has become the most frequent online threat faced by consumers, reveals research from Kaspersky Lab and B2B International. The research shows that over half (53%) of South African respondents have come across, or been targeted by malware online, with a...

  • Eugene Kaspersky

    Adwind malware hits over 400000 users

    February 9, 2016 • Security, Top StoriesComments Off on Adwind malware hits over 400000 users

    Kaspersky Lab’s Global Research and Analysis Team has published extensive research on the Adwind Remote Access Tool (RAT), a cross-platform, multifunctional malware programme also known as AlienSpy, Frutas, Unrecom, Sockrat, JSocket and jRat, and which is...

  • Nigeria

    New malware targets Android users for financial gain

    January 25, 2016 • Finance, Security, Top StoriesComments Off on New malware targets Android users for financial gain

    Kaspersky Lab’s Anti-Malware Research team has discovered Asacub – a new malware that targets Android users for financial gain. When first identified, Asacub displayed all the signs of an information stealing malware; however some versions of the Trojan...

  • Fred Mitchell - 2014

    Technology is not the silver bullet for cyber security threats

    May 21, 2015 • Security, Top StoriesComments Off on Technology is not the silver bullet for cyber security threats

    In Africa as well as globally Cyber security is no longer an IT problem, but rather a priority of the highest levels at a majority of organisations. The reason for this is simple – cyber threats have become a serious issue that costs businesses money,...

  • (Image Source: kaspersky.co.uk)

    Device users think passwords are of no value to cyber criminals

    April 22, 2015 • Security, Top StoriesComments Off on Device users think passwords are of no value to cyber criminals

    One in five Internet users, in South Africa, assume their passwords are of no value to cyber criminals, according to a survey conducted by Kaspersky Lab and B2B International. However, passwords are the keys to the account holders’ personal data, private...

  • Fortinet

    What are the keys to effective information security?

    December 17, 2014 • SecurityComments Off on What are the keys to effective information security?

    Rapidly evolving cyber threats and attack modes mean that every organisation should assume it has already been breached. The question now is – what to do next? Not only have cyber criminals become more sophisticated, but enterprise exposure to risk is...

  • Datacentrix became only the 2nd local competitor to attain the  Gold UNITY Partner certification with F5 Networks.

    Top 5 2015 Cyber Security Threat Predictions

    December 4, 2014 • Lists, Security, Top StoriesComments Off on Top 5 2015 Cyber Security Threat Predictions

    As 2015 approaches Fortinet and its threat research division FortiGuard Labs, have taken a look ahead to determine the most significant cyber security threats of the upcoming New Year – both from the perspective of a Black Hat hacker, as well as a Threat...

  • Jayson O'Reilly

    Security challenges driving the need for security policies

    October 15, 2014 • Opinion, SecurityComments Off on Security challenges driving the need for security policies

    Businesses today face myriad complex threats coming at them from every angle. From hackers and hacktivists, to sophisticated cyber criminal gangs and nation-state funded advanced attacks, these threats can be catastrophic to the business. Add to this the...

  • Lutz Blaeser, MD of Intact Security (image: LivDigital)

    No silver bullet for IT security

    October 14, 2014 • Opinion, SecurityComments Off on No silver bullet for IT security

    The security landscape is a complex one, and several layers of defence at multiple points in the organisation are needed to successfully combat today’s sophisticated threats. Unfortunately, for too many businesses, the idea of a ‘quick fix’ is tempting,...

  • Lutz Blaeser, MD of Intact Security (image: LivDigital)

    Web exploits threaten businesses

    September 30, 2014 • Opinion, SecurityComments Off on Web exploits threaten businesses

    The Web is still the greatest attack surface and largest entry point for malicious code. These attacks usually happen via drive-by downloads, which see malware being downloaded and executed without the user even realising. “These threats make use of...

  • David Holmes_World Wide Security Evangelist_F5 Networks

    Does SSL enable surveillance?

    August 14, 2014 • Opinion, Top StoriesComments Off on Does SSL enable surveillance?

    Millennials grew up with the internet and expect the internet to be there all the time. In addition to this, they expect all of their activity online to be secured and private and they commonly use encryption protocols like secure socket layers (SSL) to ward...