MENU

Posts Tagged ‘malware’

  • It's easier than ever for Android users to accidentally downloaded malware

    Over 500,000 Android users accidentally downloaded malware

    November 26, 2018 • Security, Top StoriesComments Off on Over 500,000 Android users accidentally downloaded malware

    When it comes to the security of our personal devices, phones drop down to the bottom of the list almost every time. We’re far too trusting of app developers and stores like Google Play to even consider that there might be something malicious hiding in...

  • Robert Lipovsky unpacks popular cyber threats

    Interview: Senior Malware Researcher at ESET unpacks popular cyber threats

    September 11, 2018 • People, Security, Top StoriesComments Off on Interview: Senior Malware Researcher at ESET unpacks popular cyber threats

    Cybercrime remains a looming threat in the ICT sector and doesn’t show any signs of slowing down. Cybercriminals continue to find new and sophisticated ways to override security protocols for malicious purposes. In 2017, we saw the rise of ransomware as...

  • Malicious crypto-mining increased by over 83 percent in 2018

    AppleJeus: Lazarus group hunts cryptocurrency exchanges using macOS malware

    August 26, 2018 • North Africa, SecurityComments Off on AppleJeus: Lazarus group hunts cryptocurrency exchanges using macOS malware

    Researchers in Kaspersky Lab’s Global Research and Analysis Team (GReAT) have discovered AppleJeus – a new malicious operation by the infamous Lazarus group. The attackers penetrated the network of a cryptocurrency exchange in Asia using Trojanized...

  • Research reveals how criminals target fax machines to take over networks and spread malware

    Criminals target fax machines to hijack networks and spread malware

    August 17, 2018 • Security, Top StoriesComments Off on Criminals target fax machines to hijack networks and spread malware

    New research from Check Point, a provider of cyber-security solutions globally, has shown how organisations and individuals could be hacked via their fax machines, using newly discovered vulnerabilities in the communication protocols used in tens of millions...

  • Kaspersky Lab launches new adaptive security solutions for home users in South Africa

    Phantom menace: mobile banking Trojan modifications reach all-time high

    August 6, 2018 • SecurityComments Off on Phantom menace: mobile banking Trojan modifications reach all-time high

    Mobile banking Trojans hit the list of cyber-headaches in Q2 2018. The number of installation packages for mobile banking – modifications which help attackers avoid detection by security solutions and to expand their arsenal – peaked at over 61,000. This...

  • Malware that could cut 500,000 users off from internet

    May 28, 2018 • SecurityComments Off on Malware that could cut 500,000 users off from internet

    VPNFilter, a sophisticated malware program, is said to have infected more than 500,000 routers in 54 countries, and could potentially cut users off from the internet. This malware can steal logins and passwords, can monitor industrial controls, and contains...

  • Why SMEs are especially vulnerable to cyber incidents

    Cybercriminals target pharmaceutical organisations

    April 17, 2018 • Security, Top StoriesComments Off on Cybercriminals target pharmaceutical organisations

    Kaspersky Lab’s researchers have discovered evidence of an emerging and alarming trend: more advanced cyber threat actors are turning their attention to attacks against the healthcare sector. The infamous PlugX malware has been detected in pharmaceutical...

  • ophos introduces Intercept X with advanced deep learning

    Kaspersky Lab researchers uncover Slingshot Malware

    March 12, 2018 • Security, Top StoriesComments Off on Kaspersky Lab researchers uncover Slingshot Malware

    Kaspersky Lab researchers have uncovered a sophisticated threat used for cyber-espionage in the Middle East and Africa from at least 2012 until February 2018. The malware, which researchers have called ‘Slingshot’, attacks and infects victims through...

  • Why SMEs are especially vulnerable to cyber incidents

    Security leaders rely on Automation, Machine Learning and AI to defend against threats

    February 23, 2018 • Security, Top StoriesComments Off on Security leaders rely on Automation, Machine Learning and AI to defend against threats

    Malware sophistication is increasing as adversaries begin to weaponize cloud services and evade detection through encryption, used as a tool to conceal command-and-control activity. To reduce adversaries’ time to operate, security professionals said they...

  • Is your business harnessing remote IT support services?

    How to avoid disaster in the wake of spectre and meltdowm

    February 7, 2018 • Mobile and Telecoms, Opinion, Security, Southern AfricaComments Off on How to avoid disaster in the wake of spectre and meltdowm

    Earlier this month, while the majority of South African business owners were still enjoying their summer holiday, the global technology industry suffered a rather devastating blow. Two major security vulnerabilities, dubbed Meltdown and Spectre, were...

  • Benefits of a managed IT services model

    Fighting digital security threats: Challenges, analysis and measures

    January 16, 2018 • Opinion, SecurityComments Off on Fighting digital security threats: Challenges, analysis and measures

    IT infrastructure is no longer in the sole dominion of on-premise installations and are gradually moving to the cloud. With rapidly changing market needs, there is a pressing requirement among businesses to be agile. This revolution has given rise to a never...

  • Kenya: Boda Boda Safety Association to launch bike hailing app

    Malware discovered in game apps on Google Play

    January 15, 2018 • Online & Social, Security, Top StoriesComments Off on Malware discovered in game apps on Google Play

    In the past, cyber-criminals have targeted businesses, hospitals, and governments; today, we’ve seen them begin to focus on games and apps intended for children. Check Point Researchers have revealed a new and nasty malicious code on Google Play Store that...

  • For a lot of football teams taking part in the 21st edition of the World Cup, cybersecurity has become a real worry for their travelling parties.

    Top Cybersecurity Predictions for 2018

    December 20, 2017 • Opinion, SecurityComments Off on Top Cybersecurity Predictions for 2018

    “The more things change, the more they stay the same.” Jean-Baptiste Alphonse Karr’s famous line resonated back in the 19th century Parisian literary circles, and it resonates today in the 21st century cybersecurity industry. With every new tool and...

  • Beware of cybercriminals who prey on holiday shoppers

    Cybersecurity Predictions and Trends for 2018

    December 11, 2017 • Lists, Online & Social, Security, Top StoriesComments Off on Cybersecurity Predictions and Trends for 2018

    Online security is seemingly getting more compromised with each passing year. 2017 has witnessed some of the worst security breaches in history – such as the breach of Equifax, which impacted over 143 million clients in the U.S. and abroad. There were also...

  • Cybersecurity report 2017: Africa in Top 10 targeted regions

    December 1, 2017 • Security, Top StoriesComments Off on Cybersecurity report 2017: Africa in Top 10 targeted regions

    As we draw closer to the end of the year, 2017 has seen more malware samples created each day than in the entire 20th Century. The targets have changed, the techniques have become more sophisticated, the attack vectors have multiplied, and the tools are more...

  • Beware of cybercriminals who prey on holiday shoppers

    Fortinet report reveals botnet role in cyber attacks

    November 29, 2017 • Security, Top StoriesComments Off on Fortinet report reveals botnet role in cyber attacks

    On Wednesday 29 November 2017, cybersecurity company, Fortinet, announced the findings of its latest Global Threat Landscape Report. The research reveals that high botnet reoccurrence rates and an increase of automated malware demonstrate that cybercriminals...