CYBER SECURITY

Cyber security news updates and tips on why it is critical for an enterprise to utilize cybersecurity best practices to avoid common cyber security threats.

Apple logo art

Apple Safari Browser Starts Blocking Third-Party Cookies By Default

Apple Safari browser 's latest update blocks third-party cookies by default. The update is a big privacy leap, especially to Safari's reputation in the...

Are you working at home due to coronavirus? Secure yourself with these few tips

Many if not most organisations have already crossed the “working from home”, or at least the “working while on the road” bridge. If you’re on...
Corona virus map

Hackers Can Infect Your Computer If You Visit Coronavirus Maps

As the coronavirus outbreak continues to raise eyebrows around the world, the WHO has declared it a global pandemic. Many people are now using...
man using smartphone

Remove These VPN And Ad Blocking Apps That Are Spying On Your Device

Understanding the basis of how app store analytics platforms, for instance, App Annie and Sensor Tower, sparks anxiety. These platforms try to get an...
Android virus

More than one billion Android devices at risk of hacking attacks

Security updates in the android smartphone world are quite limited. Most smartphone companies have rarely been updating their devices once they hit the consumer...
NordVPN app

NordVPN Bug Exposed Critical Customer Data With No Authentication Required

One of the world's popular VPN services, NordVPN, has experienced a critical bug that exposed user information to hackers. The vulnerability evolved around the...

Sophos acquired for $3.9 billion in cash

Cybersecurity company Sophos has announced earlier today that it has been acquired. The firm was acquired by Thoma Bravo, a private equity firm in...
PayPal

PayPal Accounts Used By Hackers For Unauthorized Payments

PayPal has fixed a bug that could let attackers perform unauthorized mass payments. The bug, according to ZDNet, lied in PayPal's Google Pay integration. Though...

Nigeria to host the 2020 Cyber Africa Summit

Global B2B events and conference organizer, Tradepass is set to host their exclusive cyber security conference, Cyber Africa Summit (CyFrica) 2020 in Nigeria. The...

Sophos launches ‘Xstream’ version of XG Firewall

Sophos has introduced a new “Xstream” architecture for Sophos XG Firewall with high performance Transport Layer Security (TLS) traffic decryption capabilities that eliminate significant...

[Column] Beware: Gender-based cybercrime

Recent South African news reports have reflected an influx of gender-based crimes targeting women. Heartbreaking and harrowing accounts have flooded the media depicting these...
Google chrome

Google Deletes Hundreds Of Chrome Extensions Involved In Malvertising

Google has axed a slew of Chrome browser extensions that were part of a malicious advertising network. The malicious extensions were uncovered by an...
Google chrome

Google Chrome To Start Blocking Insecure Downloads Soon

At times, we assume the small but very critical warnings shown by browsers. Warnings about visiting sites with no secure protocols, to downloading files...
Android logo

Bluetooth Security Flaw Paves Way For Hackers To Deliver Malware To Millions Of Android...

Android smartphones have allegedly a Bluetooth security flaw that can be exploited to deliver malicious files. Security researchers at ERNW, discovered the Bluetooth flaw,...
Facebook App Login page

Facebook Promises To Improve User Data Security After Several Breaches

Facebook has promised that they will improve their security protocol to ensure user data is safe, after several breaches. The company's pledge recently surfaced...

Strangers Might Have Downloaded Your Private Videos On Google Photos, Google Warns

Cloud storage services are a must have service in this time and age. Many people rely on these services to store their files including...

[Column] Is your personal data safe?

We share a lot more information in the digital world than we used to. Businesses, organisations, close family, friends and acquaintances- all have access...

Sophos’ Intercept X secures Android and iOS mobile users from fleeceware applications

Sophos introduced Sophos Intercept X for Mobile with new security capabilities for Chrome OS devices and improved mobile threat defense for Android and iOS devices. The company...
Microsoft logo

250 Million Microsoft Customer Service And Support Records Exposed Online

Microsoft was involved in a data breach with millions of customer service and support records exposed. The report was revealed by the Comparitech security research...
Android virus

Remove These 17 Apps From Your Android Phone ASAP!

You might be used to this kind of news already if you frequent our space. Last year no tangible progress was made in terms...
iPhone X

Your iPhone Can Now Be Used As A 2FA Security Key For Google Accounts

Google has announced that it now supports iPhones to be used as a security key for securing Google accounts. Which means that you can...
TikTok logo

Hackers Could Take Over Your TikTok Account Using SMS

CounterPoint Research has detailed a bug buried inside popular Chinese-based short video message platform TikTok, which could let bad actors take over your account....

Sophos’ MTR proactively hunts for and validates potential threats

Cybercriminals are continuously adapting new methods and increasingly launching hybrid attacks that combine automation with interactive human ingenuity to effectively evade detection. Once they gain a foothold, they’ll employ ‘Living off the...

North Korean hacker Group Reportedly Using Telegram To Steal Cryptocurrency

North Korean linked hacker group dubbed Lazarus has reportedly been using instant messaging platform Telegram to steal cryptocurrency from victims. The report comes from...

Sophos enhances MSP Connect to enable its service providers unlock new revenue opportunities

Sophos has announced that it is introducing enhancements to MSP Connect, a program that makes it easier for Managed Service Providers to deploy,...

Safaricom Customers Being Conned Using Telco’s Official Number

Looks like fraudsters are always devising new ways to con people on the Safaricom network. A number of users are now claiming to be...
facebook logo

Phone Numbers Of 267 Million Facebook Users Exposed Online In A Data Breach

Millions of Facebook users have had their data being exposed online. This follows a discovery by security researchers who found an unsecured database containing...

Avoid These 100 Malicious Apps Listed On Google Play

New Android malware has been spotted online and has infected over 100 apps available on the Google Play Store. This is according to a...

Delete ToTok From Your Device, Its Reportedly An Emirati Spy Tool

Popular Chat app ToTok is reportedly a spy tool deployed by the United Arab Emirates government. The chat app, according to a report from the...

Here Is Why You Should Update Your Twitter Android App Immediately

Twitter recently stated that it's Android app had a vulnerability that could allow malicious actors to view private user information. Through this vulnerability, hackers could...

Google Removes Avast And AVG Extensions From Chrome Web Store

Google has kicked Avast and AVG browser extensions out of the Chrome Web store. The two were found guilty of uploading user data which...
Google Chrome

Chrome Now Alerts You When Your Password is Stolen

Google’s latest Chrome version now alerts you when your password is stolen in a data breach. The new feature is available in Chrome version...

[Column] Extending security to the cloud

Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances...

Developers to make API calls with SophosLabs Intelix, a Cloud-Based Threat Intelligence Platform

SophosLabs Intelix, a cloud-based threat intelligence and analysis platform enables developers to build more secure applications. Developers will be able to make API calls...

Sophos upgrades its Cloud Optix to simplify cloud security

Endpoint security leader Sophos has unveiled advancements to its Cloud Optix that automate and simplify the detection and response of cloud security vulnerabilities and...
Virus

Unpatched Android Bug Exploited To Steal Bank Logins

When it comes to security, the Android ecosystem is not safe. Android is the most vulnerable platform out there.  New research from a Norwegian...

$4.4 Billion has been lost this year to cryptocurrency crimes, Report

2019 seems to be a good year for cryptocurrency criminals. According to a report from CipherTrace, victims have lost $4.4 Billion in cryptocurrency in...

How most prevalent and persistent ransomware families attack victims

Sophos has published How Ransomware Attacks, a playbook for defenders that explains how ransomware variants attack and impact victims. The playbook complements the 2020 Threat Report released...
WhatsApp app

WhatsApp bug could allow hackers exploit devices using MP4 files

A unique bug on WhatsApp revealed by the company could let attackers exploit your device using MP4 files. The bug, which was identified as...
Android tablets and smartphones

Pre-installed Android Apps in Phones Can Ship With Security Loopholes – Report

Nobody likes most apps that come pre-installed in Android devices. These apps are not only as good as nothing but also, as it turns...

Google is partnering with security companies to crack down on malicious apps before they...

Android is messed up, not entirely, but there is a never-ending threat to malicious apps being harbored in the official store. While it is not...
Sophos Intercept X

Sophos 2020 Threat Report: Cyber criminals are exploiting malicious Android apps, misconfigured cloud platforms...

Sophos 2020 Threat Report shows how cyber attackers are raising the stakes in ransomware, increasing stealth in malicious Android apps, exploiting misconfiguration in the...
NordVPN logo

NordVPN Announces Plans to Up its Security following Cyberattack

Following last week's reports on NordVPN, the company has announced plans to step up its security. The first move is a long-term strategic partnership...
Google

Just Googling these Celebrities might get you Hacked

Many people love celeb gossip, and that has also turned out as a sweet spot for hackers to prey on unsuspecting users. As it...

Sophos Cloud Optix to provide cloud security vulnerabilities to Amazon Web Services Customers

Sophos today announced the availability of Sophos Cloud Optix on Amazon Web Services (AWS) Marketplace. As a new agentless software-as-a-service (SaaS) offering, Cloud Optix automatically discovers...
NordVPN logo

Popular VPN Service NordVPN Was Hacked

NordVPN one of the popular VPN services that promotes itself as a tool for protecting your online privacy says it was hacked. The company...
phone spy

Android Stalking Apps Use Cases Has Risen By a Staggering 373 Percent in 2019

Stalker apps on Android is not a new thing. These apps let individuals spy on other users’ messages, call information, and GPS locations –...
Virus

Google, Xiaomi and Huawei Devices Fall Victim of a Zero-Day Flaw

Researchers from Googles' Elite bug hunting group, Project Zero, have reported the existence of a bug in Pixel, Xiaomi, and Huawei devices. The vulnerability was...
WhatsApp logo

WhatsApp Glitch Could Allow Hackers To Steal Your Media Files Using GIFs

It is again high time that you should consider updating your WhatsApp. According to a report published by a security researcher, a bug on...

[Column] Why it’s the right time for a career in cybersecurity

The cybersecurity landscape is a battle zone. War is being fought on every front, from email to firewalls to personnel to cracking complex codes,...
iPhone X

New Exploit could allow permanent jailbreaking of millions of iPhone devices

Towards the end of last month, Google’s elite bug-hunting team – Project Zero – released a report on malicious website hijacking the iPhone. But...

Growth in Fintech drives growth in cyberattacks, Kaspersky

Africa’s Fintech sector is booming! According to reports, Africa’s Fintech ecosystem has surged 60% in the last two years and the continent’s Fintech firms have...

Remove these VPN apps from your Android phone immediately

By now, you are pretty much familiar with the pattern. Google keeps fighting malicious actors on the Playstore, but still, the platform remains a...
A flying drone

Drone Attacks Slice Saudi Arabia’s Oil Production Plant Outputs by Half

Along the weekend, Saudi Arabia has been seen as a production cut on its oil production volume country-wide. According to the Financial Times, the...
lock infront of computer codes

LastPass Fixes a bug that could let Malicious website Extract your last used Password

LastPass has released details of a vulnerability on the platform that exposed credentials used on a previous website. ZDNet reported that the bug was...

Internet Solutions Sets up a Ksh.20M Cyber Threat Intelligence Centre in Kenya

Internet Solutions has set up a Ksh.20 million Cyber Threat Intelligence Centre in Kenya. The company also says will be looking to invest an...
Facebook CEO Mark Zuckeerberg

Facebook Confirms Millions of users’ Phone Numbers have been Exposed Online

Facebook has confirmed the news reports that millions of phone numbers linked with Facebook user accounts have been exposed. The company confirmed to an...
As much as 70 percent of IoT devices comprise security flaws, which means devices that you own could get hacked by online criminals too.

South Africa experiencing a disturbingly high number of data breaches

Credit reporting agency Equifax has agreed to pay more than $677m to regulators to settle claims from a data breach that exposed the personal...
Apple back iPhone

iPhones have been Quietly Hacked by Malicious Websites for Years, says Google

In what appears to be one of the deadliest attacks ever to grace the iOS land, Google has revealed a report stating hacked websites...
Google chrome

Google Issues Chrome Update to Patch This Serious Security Flaw

If you're a regular user of Google's Chrome independent of the desktop platform, it is high time that you should be updating your browser....

Why You Should Upgrade to iOS 12.4.1 ASAP!

If there is a company that has been working hard to keep its mobile OS out of trouble with hackers is Apple. The company...
airpods-bluetooth-device-phone-accessories

Bluetooth has a Serious Flaw that Exposes Millions of Devices Vulnerable to Attacks

Cybersecurity researchers have detailed a report that showcases a flaw in Bluetooth dubbed KNOB (Key Negotiation Of Bluetooth). KNOB allows an attacker to break the...

Google Report Reveals Users Stick to Passwords that have Already been Hacked

In this digital era, secure passwords are vital in protecting your personal information, not entirely, but at least you did your part. At times...
DSLR camera

Your DSLR Camera is Also Vulnerable to Ransomware Attacks

Would you have ever imagined that cameras can be susceptible to attacks? I bet you’d think they are not. The fact that cameras do...
Apple back iPhone

Apple will Offer Security Researchers Special “Unlocked” iPhones for Bug Hunting on iOS.

Following the launch of the Apple Bug Bounty program for iOS back in September 2016, the company wants to even cement its research program...
WhatsApp for Android

WhatsApp Flaw Could Allow Attackers to Alter Your Messages

Facebook's popular instant messaging app WhatsApp has yet another series of flaws that could let attackers alter your messages.  The flaws have been made...
Apple's Logo Background reflection

iMessage has a Mysterious Security Bug That Apple Is Yet to Patch

Two Google Project Zero bug hunters (Silvanovich and Samuel Groß) have revealed details on an iOS security flaw that could be capitalized on via...
defaced Systech-website

Russian Intelligence Agency Hacked! Over 7.5TB of Data Deleted

Russian Intelligence Agency (FSB) has been one of the most prominent hacker group that ever grazed the internet. However, this time around the odds...
Apple Logo

NSO Group’s Malware Now Capable of Spying on Data Stored in iCloud, Reports

The NSO Group, a famous Israel security firm has reportedly developed tools which can be able to scrape data from cloud services. This could...

IT Managers are overwhelmed with Cyberattacks and Struggling to Keep Up, Sophos Survey

Sophos today announced the findings of its global survey, The Impossible Puzzle of Cybersecurity, which reveals IT managers are inundated with cyberattacks coming from...

Report Claims China Installs Malware on Tourists’ Phones At The Border

Amid the stalled China-US trade wars that leveraged Huawei as the click bait, reports indicate the Chinese government has been forcing foreigners to download...

Unites States government considers banning end-to-end encryption

Implementation of end to end encryption in various user engagement platforms has been fantastic in taking care of online privacy. The case is different...
Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

Chinese hackers targeted big tech companies to steal trade secrets from enterprise customers

A cybersecurity firm has recently revealed information about Chinese hackers who have been hacking big telco companies intending to extract personal and corporate information...

Safaricom ups the game against fraud

Safaricom has today unveiled its new plans for tackling fraud activities on its platforms. Kenya’s largest telco reported that through the implementation of their...
Mozilla Firefox

You Have To Update Your Firefox Browser Now

A zero-day attack has hit the Firefox browser. If you run either Firefox 67.0.3 and Firefox ESR 60.7.1 or maybe you’re not sure on...

Telegram blames China for DDos attacks

Durov the founder and owner of secure messaging platform Telegram has reported the app has been hit by gazillions of "Garbage requests" that stopped...

Sophos Acquires Rook Security to Provide Managed Detection and Response

Sophos, today announced that it has acquired Rook Security, a pioneer and leader in managed detection and response (MDR) services. Rook Security provides a...
Sophos Intercept X

Sophos launches Intercept X for Server with EDR to help businesses battle new blended...

EndPoint security leader Sophos has today announced that it is launching Intercept X for Server with Endpoint Detection and Response (EDR) to help businesses...

Someone is buying a malware-loaded laptop for $1.345 million

If you thought the world is crazy-it’s not but people are. Last week a laptop loaded with malware for auctioned at an asking price...

Google stored plaintext passwords for a subset of G-Suite users since 2005

To say that our online data is secure on any website on the internet is a mere hoax. However, companies have at least developed...
google 2FA challenge

Google: 2FA blocks 100% of automated bot attacks

Think 2FA is a joke? This post is for you. The new research done by Google is something you should know. Google earlier this year...
Kaspersky Lab

Kaspersky Lab is setting up a new office in Kigali

Kaspersky Lab is opening a new office in Kigali, Rwanda. The cybersecurity and antivirus provider has announced plans to set up the new office...
Truecaller

Truecaller user data selling on the dark web for over KES 200,000

TrueCaller Indian user data has been seen selling on the dark web for over KES 200,000. The data, according to a report is that...
[Column] Data Security; embracing autonomy and intelligent machines

[Column] Data Security; embracing autonomy and intelligent machines

By Christine Ambetsa, Regional Applications Sales Leader - East Africa at Oracle CIOs are operating in a state of heightened awareness. Their mission-critical systems are...
WhatsApp app

WhatsApp voice call feature used by attackers to inject malicious spyware

On Monday, WhatsApp, a Facebook-owned instant messaging service, has reported the existence of vulnerabilities that allowed hackers to spy on its users. WhatsApp reported that...

MTN unveils Managed Security as a service solution for Kenyan enterprises

MTN Business has today launched MTN Managed Security as a service solution for its enterprise customers in Kenya. The product, according to MTN aims...
Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

Cybercriminals attacked one of the cloud server honeypots within 52 seconds of the honeypot going live in Sao Paulo, Brazil. This is according to...
Fake mobile applications exposing Kenyans to cyber fraud, CA Report

Fake mobile applications exposing Kenyans to cyber fraud, CA Report

A proliferation of mobile applications on popular online stores is exposing Kenyans to increased cyber-attacks and fraud, the latest sector statistics report by the...
facebook

Facebook stored up to 600 million user passwords in plain text

By now you have probably heard of the scary news of how Facebook stored millions of user’s passwords in plain text. The news was...
Sophos Intercept X

Sophos Intercept X Achieves Highest Security Effectiveness Score in NSS Labs 2019 Advanced Endpoint...

Sophos announced that its next-gen endpoint solution, Sophos Intercept X, was recognized for having the highest security effectiveness and the most efficient TCO (total cost...
Sophos Intercept X

Sophos Central Management Platform Now Features All Next-Gen Cybersecurity Protection from Sophos

Addition of Sophos XG Firewall provides advanced Synchronized Security capabilities for accelerated response to cyberattacks from a single cloud-based management console

Matrix Deconstructed: The trend for targeted ransomware continues

Endpoint security leader Sophos has released a new report  about a new ransomware family called Matrix. The malware has been operating since 2016 and Sophos...

5 Security Tips To Protect Your Website From Hackers

Most websites right now are using online marketing, and many people claim hackers can’t affect their site. That’s when you lower your guard, and...

Creditinfo new solution to combat synthetic identity fraud for Kenyan mobile lending market

Creditinfo has launched a new Integrated anti-fraud solution to combat identity fraud for the Kenyan mobile lending market. According to the credit information and risk...

‘Collection #1’ data breach leaks more than 700M email addresses

In what has been described as one of the largest data breach in history, the Troy Hunt owned Have I Been Pwned? (HIBP) website...

Safaricom Introduces I.T Security Solutions For its Enterprise Customers

The services include Managed Security Solutions, Security Assurance and Advisory services as well as Managed Security Operations Center solutions and will enable the customers to access a wide range of security solutions to protect their information technology (I.T) systems.

CA is warning of Emotet malware targeting local network systems

The Communications Authority of Kenya (CA), has warned of a new malware targeting network systems in the country. Known as ‘Emotet’, CA through the...

Cryptojacking shows no signs of slowing down in 2019, says ESET

Cases of cryptocurrency mining and cryptojacking will continue to grow in 2019, as attackers target smart devices and home assistants to build cryptomining farms,...
Sophos Intercept X

Sopho adds Lateral Movement Protection to XG Firewall to prevents threats from spreading

Sophos has now included lateral movement protection to prevent targeted, manual cyberattacks or exploits from infiltrating further into a compromised network. According to the SophosLabs...

More collaborative efforts required to fight mobile money fraud and cyber crime, says DPP

The Director of Public Prosecution Noordin Haji has called on all stakeholders in financial institutions and banking sector to work together to strengthen the fight against mobile...

Sophos warns of more SamSam ransomware copycat attacks in 2019

Instead of using mass spamming techniques to blast malware to millions of recipients in the hope of collecting thousands of dollars each from thousands...

CONNECT WITH US

5,171FansLike
1,250FollowersFollow
3,231FollowersFollow

TRENDING

Nigeria is getting its first-ever bitcoin ATM

Nigeria has the strongest economy in Africa and has always stood out as more or less financially stable compared to some neighbouring countries. As...

24Bit Podcast Episode 19: Value vs Brand Name

What's in a name? Well, turns out, a lot. Quite a lot. Question, would you compromise on features of a product you want to buy...

EDITOR'S PICK

Airtel Kenya Is The Only Telco That Grew Its Mobile Subscriptions...

The latest insight report into the mobile subscription industry reveals rather shocking details. The Communications Authority of Kenya in its latest Sector Statistics Report,...