Home » Security » Page 6

Security

Good News: Crypto-Mining Attacks Decline Across Africa

Image sourced from www.pymnts.com. In Q2 2022, Kaspersky solutions detected 40,788 new modifications of miners. According to Kaspersky Security Network data, in the African region, the number of home users affected by cryptominers in Q2 of 2022 decreased slightly compared to the previous quarter. However, the possibility of a surge in cryptomining attacks persists and could be directly correlated to cryptocurrency exchange rates. What is Crypto-Mining? Cryptomining is a process during which users mining cryptocurrencies utilise computers, data, codes, and calculations to validate cryptocurrency transactions and earn cryptocurrency as compensation for their work. Cryptomining is highly resource-consuming and hence expensive to do, which is why cybercriminals seek access to others’ machines ...

The Incoming Tech Helping SMBs Deal with Cyberattack Threats

Image sourced from Forbes.com. The cyber threat landscape for businesses of all sizes is terrifying. According to the World Economic Forum, risks are increasing exponentially, while the rate of detection and prosecution is frighteningly low at a rate of below 1%. Organisations, especially small businesses, already suffer the greatest threat to their ongoing viability and require an automated solution if they are to stand any chance of overcoming this critical business risk. These factors have been a crucial driver for the development team at AaDya, which strives to make security accessible and affordable through partners like SLVA Cyber Security. Patrick Evans, CEO of SLVA Cyber Security, explains that even though AaDya solutions are aimed at small to medium businesses, its offerings are c...

Uganda’s Parliament Passes Tougher Penalties for Cyber Criminals

Sourced from Travellers The Parliament of Uganda has passed the Computer Misuse (Amendment) Bill, 2022 privately moved by Muhammad Nsereko (Ind., Kampala Central), which imposes tough penalties for cyber-crimes. The Computer Misuse (Amendment) Bill, 2022 sought to amend the Computer Misuse Act, 2011 to enhance the provisions on unauthorised access to information or data; prohibit the sharing of any information relating to a child without authorisation from a parent or guardian; to prohibit the sending or sharing of information that promotes hate speech. With deletion of clauses that sought to bar convicts under the law from holding public office or running for elections in 10 years, the rest of the clauses unanimously sailed through uncontested, with MP Gorreth Namugga (NUP, Mawogola Count...

Entrepreneurs must learn to tackle business risks in the Metaverse

Hyped as it is, the Metaverse remains largely undefined. It’s a challenge to answer the question “What is the Metaverse?” in part because its definition depends on whom you ask. As it stands today, the “Metaverse” includes virtual reality and what we might previously have called “cyberspace” — including digital assets like non-fungible tokens (NFTs), cryptocurrencies and more. In the rush to become the first to innovate in metaverse technology, companies are deprioritizing risk management. But risk management is as critical in the Metaverse as in our physical world — all risk is linked and must be managed in a connected way. If new entrants to the Metaverse are meant to protect against the overwhelming scale and cost of cyber risks, they must learn to identify these risks, continuously mon...

Exclusive Networks Africa Continues its Expansion Plans Throughout the Continent

Exclusive Networks Africa, which represents the continental arm of this global, trusted cybersecurity specialist for digital infrastructure, is continuing its expansion into Africa, building presence within the sub-Saharan region in recent months, including the opening of a formal office in Lagos, Nigeria. This adds to the existing offices in South Africa, Kenya and Mauritius. Because Africa is seen as a growth market by the Group, it is widely recognised as an important investment destination, allowing for a strong focus on the company’s vendor partners, both current as well as potential. This is according to Anton Jacobsz, Managing Director of Exclusive Networks Africa, who clarifies: “Having previously operated in a number of countries across Africa with the support of representatives t...

Malware That Steals Credit Card Details Targets South African & Kenyan Gamers

Sourced from Tech Advisor In the first half of 2022, Kaspersky researchers detected increased activity of cybercriminals abusing gamers. Globally, the number of users attacked by malicious software, which gathers sensitive data and spreads under the guise of some of the most popular gaming titles, has increased by 13% compared to the first half of 2021. In attempts to download new games from untrustworthy resources for free, players got malicious software instead, losing their gaming accounts and even funds. These and other findings are part of the report of the gaming-related threat issued by Kaspersky. To assess the current landscape in gaming risks, Kaspersky experts observed the most popular PC and mobile games-related threats. Globally over the year (from 1 July, 2021 to 30 June, 2022...

What is Good Cloud Migration Security?

Sourced from InfoWorld. Cloud adoption continues to be important for many organizations as they transform how they do business in today’s digital world. While there are many benefits associated with cloud adoption, the security implications of moving to the cloud cannot be ignored if organizations are to fully embrace it. This blog outlines the benefits of cloud migration and the security challenges associated with the process. Also, there is a list of best practices for creating a powerful cloud migration security strategy. What is Cloud Migration? Cloud migration is the process of transferring an organization’s data and apps from on-premises servers to a cloud infrastructure. Cloud infrastructure enables organizations to access data storage requirements and computing capabilities when th...

Liquid Networks Launches DDoS Security for African Businesses

Image sourced from Insurance Chat. Liquid Networks, a business of Cassava Technologies, a pan-African technology group, today announced the launch of its Distributed Denial of Service (DDoS) Secure offering to its customers. The solution is designed to proactively mitigate attacks by scrubbing traffic and blocking known attackers or malicious traffic. “Cyber Attacks are at an all-time high; cyber security threats cost the African GDP almost a whopping US$4.1 billion in 2021. And, DDoS are on top of the cyber security attacks; the staggering cost to our GDP is proof enough that no business can afford to be without a layer of protection against them. While DDoS attacks have evolved over the years, our offering is equally sophisticated. With traffic scrubbed at one of our four scrubbing centr...

Want to Be a Cybersecurity Expert? Kaspersky is Now Offering an Online Course

Sourced from Hypertext Developed by Kaspersky’s own cybersecurity specialists, the course aims to help businesses enhance or even build a security operations centre (SOC) from scratch – and improve SOC and security team skills in threat hunting, incident detection and investigation. The course guides the audience through the SOC structure, threat intelligence, and relevant attacks. The on-demand format and virtual hands-on labs allow training at the student’s own pace. “Enterprises need to bridge the expertise gap and increase the effectiveness of their security operations. While the question of additional investment is always sensitive, online education may be the solution to achieve their goals. Keeping in mind this business challenge, we developed a bunch of expert training courses on t...

iPhone 14: Users Fall For Scams Ahead of the Release of Apple’s New Smartphone

Apple has confirmed the long-awaited new iPhone 14 will be announced to the public on the 7th of September during its global Apple Event in September. Cybersecurity experts at Kaspersky have already found numerous examples of phishing pages, offering to buy the 14 iPhone, but actually designed to empty victims’ bank accounts and steal their Apple ID accounts. Overall, from 10 to 25 August, Kaspersky security solutions detected more than 8,700 new iPhone-related phishing sites. As the iPhone 14 announcement date gets closer, the number of phishing pages has been also increasing. For example, on August 25, Kaspersky experts detected a total of 1,023 iPhone-related phishing pages, which is almost twice the average number of such malicious site detections per day for the period. The number of ...

What is decentralized identity in blockchain?

Self-sovereign identity is a concept that refers to the use of distributed databases to manage PII. The notion of self-sovereign identity (SSI) is core to the idea of decentralized identity. Instead of having a set of identities across multiple platforms or a single identity managed by a third party, SII users have digital wallets in which various credentials are stored and accessible through reliable applications. Experts distinguish three main components known as the three pillars of SSI: blockchain, verifiable credentials (VCs) and decentralized identifiers (DIDs). Blockchain is a decentralized digital database, a ledger of transactions duplicated and distributed among network computers that record information in a way that makes it difficult or impossible to change, hack or cheat. Seco...

The Current & Future State of Smart OT Security

Image sourced from Pixabay It’s no surprise that security and network professionals working in operational technology (OT) environments are eager to take advantage of the emerging capabilities of digital transformation. Adopting modern technologies like cloud computing, machine automation, and the Internet of Things (IoT) across the industrial sector offers many potential benefits, ranging from streamlined processes that contribute to increased staff productivity to decreased plant downtime. However, a new report published by Smart Industry and sponsored by Fortinet explores the challenges these decision makers face when balancing the acceleration of their digital transformation efforts with the creation and maintenance of a strong security program. The report...