MENU

Posts Tagged ‘malware’

  • Westcon-Comstor Sub-Saharan Africa to distribute Check Point Software

    Westcon-Comstor Sub-Saharan Africa to distribute Check Point Software

    September 27, 2019 • SecurityComments Off on Westcon-Comstor Sub-Saharan Africa to distribute Check Point Software

    Westcon-Comstor Sub-Saharan Africa, value-added technology distributor has announced the appointment of Westcon-Comstor as a Check Point distributor for the Sub-Saharan African region. The appointment highlights further expansion of the Westcon-Comstor...

  • INTERVIEW: Kaspersky Chief Business Officer on transforming the cybersecurity industry

    INTERVIEW: Kaspersky Chief Business Officer on transforming the cybersecurity industry

    August 27, 2019 • People, Security, Top StoriesComments Off on INTERVIEW: Kaspersky Chief Business Officer on transforming the cybersecurity industry

    Chief Business Officer of Kaspersky Lab, Alexander Moiseev has been a part of the Kaspersky family since 2006. According to the company, he is also one of the driving forces behind Kaspersky’s technology and innovation investments in transportation systems...

  • No environment is immune to cyber attacks-Check Point study reveals

    No environment is immune to cyber attacks-Check Point study reveals

    July 29, 2019 • SecurityComments Off on No environment is immune to cyber attacks-Check Point study reveals

    The “Cyber Attack Trends: 2019 Mid-Year Report” conducted by CheckPoint provides a detailed overview of the cyber-threat landscape. According to the study, no environment is immune to cyber-attacks as cybercriminals continue to develop new...

  • New machine learning technology to protect against advanced threats on Android users

    New machine learning technology to protect against threats on Android users

    June 24, 2019 • Mobile and Telecoms, SecurityComments Off on New machine learning technology to protect against threats on Android users

      Kaspersky has unveiled a new security feature for Android devices. The feature, based on machine learning technology, ensures immediate proactive detection of advanced malware to minimise the risks of mobile devices being exposed to cyber attacks....

  • How to backup virtual machines for free

    How to backup virtual machines for free

    May 26, 2019 • GeneralComments Off on How to backup virtual machines for free

    Virtual machines are very handy, but like any computer system, they can go wrong. Files become corrupted and hardware fails. If this happens to you and you haven’t performed a backup recently, you could end up losing a lot of essential data. Here is our...

  • Steer clear of malicious programs pretending to be TV shows

    April 1, 2019 • Security, Top StoriesComments Off on Steer clear of malicious programs pretending to be TV shows

    Cybercriminals are actively using new episodes of popular TV shows to distribute malware, research by Kaspersky Lab has found. Game of Thrones, The Walking Dead, and Arrow are the shows receiving the most attention from attackers. These and other findings are...

  • EMEA global hotspot for brute force access attacks-study reveals

    Beware of new malicious trojan doing the rounds

    March 1, 2019 • SecurityComments Off on Beware of new malicious trojan doing the rounds

    If you haven’t heard of it yet, then be on the lookout for this malevolent trojan currently doing the rounds. Emotet is reported to dwarf the impact of WannaCry and NotPetya which made headlines in 2018 for multimillion-dollar losses incurred to businesses...

  • It's easier than ever for Android users to accidentally downloaded malware

    Over 500,000 Android users accidentally downloaded malware

    November 26, 2018 • Security, Top StoriesComments Off on Over 500,000 Android users accidentally downloaded malware

    When it comes to the security of our personal devices, phones drop down to the bottom of the list almost every time. We’re far too trusting of app developers and stores like Google Play to even consider that there might be something malicious hiding in...

  • Robert Lipovsky unpacks popular cyber threats

    Interview: Senior Malware Researcher at ESET unpacks popular cyber threats

    September 11, 2018 • People, Security, Top StoriesComments Off on Interview: Senior Malware Researcher at ESET unpacks popular cyber threats

    Cybercrime remains a looming threat in the ICT sector and doesn’t show any signs of slowing down. Cybercriminals continue to find new and sophisticated ways to override security protocols for malicious purposes. In 2017, we saw the rise of ransomware as...

  • Malicious crypto-mining increased by over 83 percent in 2018

    AppleJeus: Lazarus group hunts cryptocurrency exchanges using macOS malware

    August 26, 2018 • North Africa, SecurityComments Off on AppleJeus: Lazarus group hunts cryptocurrency exchanges using macOS malware

    Researchers in Kaspersky Lab’s Global Research and Analysis Team (GReAT) have discovered AppleJeus – a new malicious operation by the infamous Lazarus group. The attackers penetrated the network of a cryptocurrency exchange in Asia using Trojanized...

  • Research reveals how criminals target fax machines to take over networks and spread malware

    Criminals target fax machines to hijack networks and spread malware

    August 17, 2018 • Security, Top StoriesComments Off on Criminals target fax machines to hijack networks and spread malware

    New research from Check Point, a provider of cyber-security solutions globally, has shown how organisations and individuals could be hacked via their fax machines, using newly discovered vulnerabilities in the communication protocols used in tens of millions...

  • Kaspersky Lab to open office in Rwanda

    Phantom menace: mobile banking Trojan modifications reach all-time high

    August 6, 2018 • SecurityComments Off on Phantom menace: mobile banking Trojan modifications reach all-time high

    Mobile banking Trojans hit the list of cyber-headaches in Q2 2018. The number of installation packages for mobile banking – modifications which help attackers avoid detection by security solutions and to expand their arsenal – peaked at over 61,000. This...

  • Malware that could cut 500,000 users off from internet

    May 28, 2018 • SecurityComments Off on Malware that could cut 500,000 users off from internet

    VPNFilter, a sophisticated malware program, is said to have infected more than 500,000 routers in 54 countries, and could potentially cut users off from the internet. This malware can steal logins and passwords, can monitor industrial controls, and contains...

  • 2018 is the 'Year of the Next-Gen cyberattack'-Carbon Black report

    Cybercriminals target pharmaceutical organisations

    April 17, 2018 • Security, Top StoriesComments Off on Cybercriminals target pharmaceutical organisations

    Kaspersky Lab’s researchers have discovered evidence of an emerging and alarming trend: more advanced cyber threat actors are turning their attention to attacks against the healthcare sector. The infamous PlugX malware has been detected in pharmaceutical...

  • Kaspersky Lab enriches its APT Intelligence Reports with added actors' profiles and MITRE ATT&CK framework

    Kaspersky Lab researchers uncover Slingshot Malware

    March 12, 2018 • Security, Top StoriesComments Off on Kaspersky Lab researchers uncover Slingshot Malware

    Kaspersky Lab researchers have uncovered a sophisticated threat used for cyber-espionage in the Middle East and Africa from at least 2012 until February 2018. The malware, which researchers have called ‘Slingshot’, attacks and infects victims through...

  • 2018 is the 'Year of the Next-Gen cyberattack'-Carbon Black report

    Security leaders rely on Automation, Machine Learning and AI to defend against threats

    February 23, 2018 • Security, Top StoriesComments Off on Security leaders rely on Automation, Machine Learning and AI to defend against threats

    Malware sophistication is increasing as adversaries begin to weaponize cloud services and evade detection through encryption, used as a tool to conceal command-and-control activity. To reduce adversaries’ time to operate, security professionals said they...