Cybersecurity news

WhatsApp Overwhelmingly Popular for Phishing Scammers, According to Kaspersky

Anonymised data, voluntarily provided by Kaspersky Internet Security for Android users, has shown which messenger apps are the most popular among phishing scammers. The biggest share of detected malicious links between December 2020 and May 2021 were overwhelmingly sent via WhatsApp (84.9%), followed by Telegram (5.7%). “Percentage of Phishing Detections by Messanger App.” Courtesy of Kaspersky. Viber is in third place with a share of 4.9% and Hangouts has less than 1%. Countries experiencing the highest number of phishing attacks were Russia (46%), Brazil (15%) and India (7%). Globally, 480 detections were recorded per day. Messenger Apps Surge in Popularity According to research, messenger apps outstripped social networks by 20% in 2020, in terms of popularity among users, and ...

Microsoft Acquires Cybersecurity Startup RiskIQ as Ransomware Threat Looms

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent. You Deserve to Make Money Even When you are looking for Dates Online. So we reimagined what a dating should be. It begins with giving you back power. Get to meet Beautiful people, chat and make money in the process. Earn rewards by chatting, sharing photos, blogging and help give users back their fair share of Internet revenue.

6 Ways Gamers Can Protect Themselves from Web Attacks

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent. You Deserve to Make Money Even When you are looking for Dates Online. So we reimagined what a dating should be. It begins with giving you back power. Get to meet Beautiful people, chat and make money in the process. Earn rewards by chatting, sharing photos, blogging and help give users back their fair share of Internet revenue.

Cyber Threats on the Rise in Mining & Manufacturing Industries

Image sourced from Software ONE. Increasingly companies are looking to adopt smart technologies to optimise production and decision-making in order to create businesses of the future. However, as reliance on autonomous and digital technology grows, so too does the risk of cyber-attacks. As technologies become more interconnected, the potential cybersecurity threats and attack vectors are growing. The consequences of these threats can be severe, resulting in production and revenue losses, regulatory fines, reputational damage, as well as the shutdown of critical infrastructures. This has been further compounded by the complexities and uptake of smart systems that use advanced technologies such as machine learning and the Internet of Things (IoT). Mining, Manufacturing Under Threat Termed ‘S...

Surging DDoS Attacks Drive Growing Demand for Third Party Protection Services

Image sourced from Shutterstock. As the global workforce largely shifted to work-from-home in response to the COVID-19 pandemic, reliance on online services soared. Many businesses were able to successfully pivot to this new normal as remote connectivity allowed access to vital systems and data. But as is often the case, no good deed goes unpunished. As the latest NETSCOUT Threat Intelligence Report shows, cybercriminals have exploited new vulnerabilities created by remote work across a wide variety of vertical industries. Making matters worse, perpetrators no longer have to be particularly technology-savvy in order to pull off attacks. Today, it is easy and relatively inexpensive to access sophisticated attack tools via for-hire services: A cottage industry has sprung ...

Iron Mountain’s Kevin Akaloo Talks PoPIA – Crucial Steps for Compliance and Harsh Penalties for Not

Kevin Akaloo, National Head of Sales – Private and Public sector – at Iron Mountain SA. PoPIA is here. After months of speculation and waiting with bated breath, the Information Regulator of South Africa has said that the PoPI (Protection of Private Information) Act will become effective as of 1 July 2021. “PoPIA enforcement powers as promulgated by the President of South Africa in June 2020 will still be coming into effect as of 1 July 2021,” said Information Regulator chair Pansy Tlakula. ITNA’s Luis Monzon had the opportunity to chat with Kevin Akaloo, National Head of Sales at Iron Mountain South Africa, a global leader for storage and information management services that is trusted by more than 220,000 organizations around the world, to get his insights into the PoPI Act –...

Recent Increases in Cyberattacks Could Be Due to Leaked Cyber “Superweapons”

Sourced from Forbes Check Point Research (CPR), the Threat Intelligence arm of Check Point Software Technologies Ltd., a leading provider of cybersecurity solutions globally, warns of a further increase in cyberattacks and thinks it could be partly down to major powers leaking, what they refer to as, ‘cyber superweapons’. “We have long warned that organisations of all sizes are being bombarded by a global fifth generation of cyber threats (Gen V). These are multi-vector cyber threats that can cause fatal damage and irreparable harm to the reputation of the compromised company,” said Pankaj Bhula, Regional Spokesperson at Check Point Software. “However, most companies are only secured against what we call third-generation threats (Gen III), which are threats that we’ve known about since the...

Inside the Mind of Cybercriminals – How Threat Actors Think

Cybercriminals come in many different flavours, but the majority of them are in it for one thing: financial pay-off. They want the money that comes with offering their tools or services, selling stolen data, extortion like ransomware or plain fraud. And they all have one thing in common – your organisation is on their radar. This is why, says Anna Collard, SVP Content Strategy and Evangelist at KnowBe4 Africa, it is critical to understand how cyber criminals operate, the tools they use and the approaches they take to embed robust security within the organisation. “With ransomware going rampant and victim organisations paying up to millions of U.S. dollars to the extortionists, this problem is just going to get worse. The U.S. government recently announced that ransomware is a national cybe...

South African Investors Lose $3.6-Billion in Massive Crypto Scam

Image sourced from Shutterstock. AfriCrypt, a South African cryptocurrency investment company, has reportedly defrauded around $3.6-billion in investor funds after the company made claims that its trading systems had been hacked. Investors in AfriCrypt reportedly count amongst South African celebrities and other high profile individuals. In a matter of hours the staggering monetary amount, around R54-billion, seemingly disappeared without a trace on 13 April. $3.6-Billion in Stolen Cryptocurrency Shortly after claiming that its systems had been shut down by a hack, AfriCrypt’s teenage “directors”, brothers, Ameer and Raees Cajee (17 and 20, respectively) allegedly transferred all investor funds from their South African bank account before fleeing to the UK, reports Independent Media. AfriC...

Broken Endpoints in Your Organisation’s Cybersecurity: The Role of Superior Endpoint Detection

Stefan van de Giessen, General Manager: Cybersecurity at Networks Unlimited. Networks Unlimited is applying a ‘broken window, broken business’ principle when looking at an organisation’s internal cybersecurity posture, in order to have a positive effect on its business processes. The moral of the ‘broken window’ story, which has been studied by psychologists, is that once a window in a building is broken, people then feel that they are able to damage the property even further, and ultimately loot and steal from it, with impunity. “When we put this into a cybersecurity context,” says Stefan van de Giessen, General Manager: Cybersecurity at Networks Unlimited, “this means, in essence, making sure that you have no ‘broken windows’ or gaps in your security through which uninvited elements coul...

PoPIA Deadline Extended – Information Officer Registration Portal Broken

After a series of technical glitches with the Information Regulator’s registration portal for information officers looking to achieve compliance with the PoPI Act, the 1 July 2021 compliance deadline has been scrapped. In a statement released on Tuesday, the Information Regulator said that this decision is also based on numerous concerns raised by responsible parties regarding the registration process. “The regulator is currently looking into alternative registration processes and will communicate this in due course. We understand that our portal malfunctioning has caused a lot of anxiety and panic and for that, we really do apologise,” Information Regulator chair Pansy Tlakula said. Deadline Extended by 1 Year With this, the regulator has extended the applications for prior authorisation ...

Is Cybersecurity as Necessary as Electricity?

Sourced from Travellers Cybersecurity has become as much a business necessity as having electricity says South African financial services and insurance company, Sanlam. Threat actors are constantly evolving and relentlessly hunting for vulnerabilities, cybercrime has become so profitable that exploitation is their business priority, and regulation is increasingly complex to navigate and manage. For Sanlam, cybersecurity has always been more than plugging holes and filling gaps, it’s a priority that has to be embedded within business foundations while managing cost, growth, customer experience, data analytics and regulatory controls. “Developing a comprehensive and holistic cybersecurity solution is a mandate for us, one that we must meet to ensure customer, stakeholder and industry trust. ...