Home » Internet security

Internet security

How to Secure Your Remote Work Environment from Cybersecurity Threats

Sourced from International IDEA Cybersecurity threats are at an all-time high. With organizations increasingly employing hybrid work models, it has become more vital than ever to educate employees on the various cybersecurity risks that come with a distributed work environment. In a hybrid work environment, employees working from home pose a greater security risk compared to those working at the office. Home networks are less secured than corporate networks, unprotected by in-office firewalls and advanced fraud detection systems. In the comfort of one’s home, a small mistake by an employee could potentially risk the company’s confidential data being leaked. However, risks like data leaks and device compromise can be managed by following certain best practices. Here are some of the practice...

How “Squid Game” is Being Used to Spread Malware & Steal User Info

Image sourced from WhatToWatch. During the month following its release, Squid Game, a South Korean survival drama TV series, became Netflix’s biggest show, with more than 111-million viewers. Following this unprecedented demand from viewers, cybercriminals were not shy in taking advantage of fans’ eagerness to watch the show, with well-known fraud schemes hitting the web themed after the series. Experts from cybersecurity group Kaspersky share their insights on the most common and sophisticated Squid Game-related threats found in the wild, including Trojans, adware, and phishy offers of Halloween costumes. Download an Episode of Squid Game for Free. Oh, and Some Malware too. From September to October 2021, Kaspersky found several dozen different malicious files on the web, the names of whi...

The Mobile Malware Scourge Hits SA, Kenya & Nigeria

Internet security provider Kaspersky has blocked more than 206,000 mobile malware attacks across the Middle East, Turkey, and Africa (META) region in just 6-months measured, between January to June 2021. Out of these attacks, a combined 30,000 originated from Nigeria (14,071), Kenya (10,697), and South Africa (5,499), respectively. Significantly, for the African countries monitored, Nigeria only trails Egypt (19,466) by the number of attacks blocked, pointing to how prevalent mobile threats have become in this highly connected country. In fact, Kaspersky’s latest research shows that when looking at the top ten countries by share of users attacked by mobile malware Nigeria places eighth (at 11.76%). Even though Kenya and South Africa might not feature as prominently, the mobile malware thre...

Utopia P2P: How it Works

We, the 1984 Group, have developed a solution the global community has been in desperate need of for decades. In our modern time, which with every passing day seems to more closely resemble the dystopian world Orwell described in his classic novel 1984, a secure communication tool such as Utopia is more essential than ever. To begin, it is worth noting that Utopia is a third-generation peer-to-peer (P2P) network, which means that all nodes connected to the network are equal. A peer-to-peer network is a completely decentralized system without any reliance on central servers. The main advantage of abandoning the client-server architecture is the ability to maintain performance with any arbitrarily large number of network participants. We believe that any central server is a potential threat ...

Cybersecurity Reimagined for the CIO

Sourced from International IDEA Despite the technological innovation taking place, companies would do well to remain focused on ensuring their IT fundamentals are in place before rushing to capitalise on the latest trends. And nowhere is this more critical than when it comes to cybersecurity. Expectations are that the impact of global cybercrime will cost businesses more than $6 trillion by the end of next year, up from $3 trillion in 2015. It, therefore, remains one of the most significant challenges as digital transformation continues to grow in momentum, and the cloud has become part of standard business operations. Fortunately, companies are taking the protection of their data and networks seriously. Worldwide spending on information security solutions is anticipated to grow at a five-...

Global VPN Use Exploded in March

With millions working from home, the COVID-19 pandemic has seen the global usage of VPN demand swell. Demand for commercial VPNs (Virtual Private Networks) in the US jumped by 41% between 13 March and 23 March according to research from Top10VPN.com, a VPN research and testing company in the U.K. Network World writes that VPNs were already a growing industry before the coronavirus outbreak struck the world and the subsequent shutdown of workplaces. The global VPN market was forecast to grow 12% year-on-year and be worth $70-billion by 2026, according to a Global Market Insights 2020 survey. North America was forecast to remain the leader in VPN usage, with around 30% market share. Top10VPN.com found global VPN demand increased by 41% over the second half of March and remains 22% higher tha...