Installing updates is considered a routine boring task, according to a study commissioned by Kaspersky. The research revealed that four-in-ten (47%) of South Africans admit that the time spent waiting for updates to take place can be used productively and they are making this a reality in their day-to-day lives. Updates to devices are not only necessary to gain access to new features or interfaces, but they also help to maintain a high level of security. Vendors regularly test their offerings to find new potential vulnerabilities that could be exploited by attackers. The timely installation of updates can serve as an effective defence against cybercriminals. This downtime can also increase people’s productivity and help with well-being. South Africans agree that the time spent waiting for ...
Sourced from Republic Title A new kind of Android spyware has been distributed by Transparent Tribe, a prolific APT group, under the guise of official COVID-19 applications – according to Kaspersky researchers. The threat actors have capitalised on the pandemic to extend their operations and infect mobile devices. Recent findings show that the group has been actively working on improving its toolset and expanding its reach to include threats to mobile devices. During the investigation, Kaspersky was able to find a new Android implant used by the threat actor to spy on mobile devices in attacks, which was distributed as fake national COVID-19 tracking apps. The connection between the group and the two applications was made thanks to the related domains that the actor used to host malic...
Sourced from IOL. Researchers from cybersecurity and antivirus experts, Kaspersky, have uncovered a new technique for stealing users’ payment information on online shopping websites – a type of attack known as web skimming. Web skimming is a popular practice used by attackers to steal users’ credit card details from the payment pages of online stores, whereby attackers inject pieces of code into the source code of the website. This malicious code then collects the data inputted by visitors to the site (i.e. payment account logins or credit card numbers) and sends the harvested data to the address specified by attackers. Often, to conceal the fact that the webpage has been compromised, attackers register domains with names that resemble popular web analytics services, such as Google Analyti...