CYBER SECURITY

Cyber security news updates and tips on why it is critical for an enterprise to utilize cybersecurity best practices to avoid common cyber security threats.

Sophos

Sophos: Be wary of ProLock ransomware and its faulty decryptor

Sophos has warned business to be wary of ProLock, a quirky, destructive ransomware with troubling aftershocks.  SophosLabs has provided an in-depth look at this ransomware and...
Strathmore University Joins the Fortinet Security Academy Program

Strathmore University Joins the Fortinet Security Academy Program

Strathmore University has announced it has collaborated with Fortinet, a global leader in broad, integrated and automated cybersecurity solutions, to develop cybersecurity talent and...
Twitter

Twitter says Hackers Accessed DMs of Dozens of High-profile Accounts

A week ago a massive Twitter hack happened that sent the internet into shock. In a coordinated attack that saw several high-profile Twitter accounts...

Cybersecurity Spending to Grow by up to 6% in 2020, Report

The global cybersecurity spending is expected to grow by 5.6% in 2020 in its best-case scenario, says Canalys, with investment continuing to outpace the...
Women Cybersecurity Africa

Top 50 Women In Cybersecurity In Africa

The Top 50 Women in Cybersecurity Africa accolade recognizes women in cybersecurity in Africa who are making significant contributions to the industry and profession...
Twitter app icon

High-profile Twitter Accounts Hacked in Crypto Scam

Twitter Hacked: A number of high-profile Twitter accounts have recently been hacked simultaneously in a cryptocurrency scam. Some of the affected accounts included Barrack Obama,...
Google Bans Advertisement of Unauthorized Tracking Technology

Google Bans Advertisement of Unauthorized Tracking Technology

Google has banned the advertisement of unauthorized tracking technology. In new policy changes set to take effect on August 11, 2020, the company won’t...
SWVL security breach

SWVL Breached; Customer Names, Email addresses, and Phone Numbers Leaked

The Egyptian-born ride-hailing company, SWVL, has recently reported a security breach in their systems. In an email sent to its customers, first reported by Gadgets...
Facebook CEO Mark Zuckerberg

Facebook Continued to Share User Data With Developers Longer Than Promised

Facebook has come clean, saying they shared user data with third-party developers longer than they had promised. The US Social media giant found itself...

Insiders remain one of the key threats to corporate cybersecurity in East Africa –...

Insider-related cybersecurity incidents in East Africa is one of the key threats in East Africa.  This is according to a recent report from cybersecurity...
Safari Browser icon

Safari Plans to Bring Password-less Logins via Face ID and Touch ID

Apple’s default Safari browser on iPhones will support a more secure way of login soon. Safari 14 is set to be released later this...
Some Twitter Business Users Private Data Might Have Been Exposed, Company Warns

Some Twitter Business Users’ Private Data Might Have Been Exposed, Company Warns

Twitter has emailed some of its business users telling them that their data may have been compromised. These include business users that use Twitter's...
Paul Ducklin, principal research scientist, Sophos

[Column] Time to rethink your approach towards password change

Until a few years ago, everyone received advice to change passwords on a regular and frequent basis, just because it was possible. But the...
Telegram logo

Russia Lifts Ban on Private Messaging App Telegram

Finally, Russia is lifting its ban on Telegram, the popular private messaging app developed by Russian-born developer, Parel Durov. The announcement came from the Russian...
Zoom app free

Zoom changes mind, says it will provide end-to-end encryption to free users

Zoom has quickly changed its hard stance against its upcoming end-to-end encryption technology. After being pressured on security and privacy grounds, the company announced...
Google Two-Factor Authentication-promt

Google Switches To Phone Notifications As Default Two-Factor Authentication Method

Two-factor authentication is a great way of securing your online accounts. Its use has grown immensely in the past few years as many people...
Cisco's NetAcad program commits to train 1M African students by 2025

Cisco’s cloud-native security platform Cisco SecureX now available globally

Cisco has announced the general global availability of its cloud-native security platform Cisco SecureX. Cisco launched this platform in February as a way of...
Sophos Intercept X

Sophos unveils an updated version of its EDR solution

Sophos today unveiled an updated version of its Endpoint Detection and Response (EDR), the first solution designed for both security analysts and IT administrators. This...
Zoom Office

Zoom Won’t Encrypt Calls For Free Users So Law Enforcement Agencies Can Have Access...

Early last month, Zoom acquired Keybase, a New York-based startup that provides a secure messaging and file-sharing service. The acquisition was a part of...
Mount Kenya University Alumni centre

Data of Thousands of Mount Kenya University Students Leaked Online in Hacker Forums, Report

A new report suggests that data of various Mount Kenya University students – both past and present – is being shared online in hacker...
iOS 13

Apple Patches an iOS 13 Vulnerability that Allowed iPhone ‘Jailbreaking’

Just last week,  the unc0ver team discovered an iOS 13.5 vulnerability that allowed anyone to jailbreak an iPhone or iPad. The company yesterday released...
Safaricom Calling Rates

Safaricom Now Notifies You When Someone Tries To Register a SIM Card Using your...

SIM swap frauds are pretty common in Kenya but Safaricom has been stepping up its game to tackle the menace. The company has in the...

Paying Ransom Doubles Ransomware Attack Recovery Cost, Says Sophos

Many organisations have always considered paying cyber ransom whenever they are hit by a ransomware attack. Doing so might however not be a good...
Zoom Room

Zoom is Bringing The Real End-to-End Encryption This Time, But There’s a Catch

Zoom is finally taking the big leap to bring an end to end encryption (E2EE) as it continues its 90-day challenge to beef up...
Mozilla Firefox Logo

FireFox Latest Update Strengthens its Password Manager for Improved Privacy and Security

Mozilla has launched a new version of its Firefox browser – Firefox 76. In the latest update, Mozilla has focused primarily on beefing up...

Xiaomi Accused Of Collecting Browsing Data From Their Web Browsers

A recent shocking report from Forbes’s cybersecurity contributor and associate editor, Thomas Brewster, reveals that Xiaomi browsers are sending browsing data to Xiaomi-rented remote...
Google Chrome logo

Google Plans To Remove Spammy Add-ons from Chrome’s Web Store

Google is taking matters in its hands by retiring spammy chrome add-ons available on the web-store. Since its inception in 2011, Chrome's Webstore has...
Android logo

Android Vendors Are Making Tangible Progress in Issuance of Security Patches

Android devices, especially non-premium ones, have long been left out of the cold from critical security patches, but that has been changing. Thanks for...
Virus

Malware infects 1.69M Android Handsets in South Africa, Report

Secure-D from mobile tech company Upstream detected 1.69 million malware-infected Android devices in South Africa last year. Within many popular apps, Malware is lurking...

Sextortion Money Trail Leads to Underbelly of Cybercriminal Activity, SophosLabs Report

Sophos has published a SophosLabs article, Following the Money in a Massive “Sextortion” Spam Scheme, that shows how the funds extracted from victims led...
person wearing scream mask and-black hoodie

Hackers Attacked Businesses 22 Million Times In The Past 7 Days Globally, Report

Staying and home and betting on the internet to get most of the daily activities done that during the pre-Covid19 period needed one to...
Zoom logo

Over 500,000 Stolen Zoom Accounts Sold Online For Cents

Over 500,000 stolen Zoom accounts have been spotted online being sold for cents each and sometimes even free, reports BleepingComputer. According to Cybersecurity intelligence...
Sophos

Sophos Reports discovers 30 Fleeceware Apps Targeting iPhone users

Sophos has published a new report showing how Apple device users are being targeted by applications that overcharge users through costly subscriptions or unscrupulous...
Zoom Office

Google Joins Other Organizations In Banning Zoom Over Security Concerns

Zoom is a security mess, and that has been proved over and over in the past few weeks. Last week, the company’s CEO, Eric...
Zoom Office

Zoom Freezes Feature Updates Committing To Improve Security And Privacy As Scrutiny Increases

Over the past three months, Zoom has seen its daily usage numbers explode. Zoom CEO Eric S. Yuan says that the platform had just...

Watch out! Scummy scammers target home deliveries

If you’re sitting at home right now, sheltering from the coronavirus pandemic – and there’s a good chance you are – then you are...
Zoom Office

Zoom Isn’t End To End Encrypted, Report Reveals

Popular video conferencing Zoom has long stated that it’s end to end encrypted, but that is not the case, a report revealed. Typically, end...

Sophos tracks significant COVID-19 related cyber-scams

Due to the ongoing global coronavirus (COVID-19) pandemic, cyber criminals are taking advantage of unsuspecting users to breach their system. This might have a...
Apple logo art

Apple Safari Browser Starts Blocking Third-Party Cookies By Default

Apple Safari browser 's latest update blocks third-party cookies by default. The update is a big privacy leap, especially to Safari's reputation in the...

Are you working at home due to coronavirus? Secure yourself with these few tips

Many if not most organisations have already crossed the “working from home”, or at least the “working while on the road” bridge. If you’re on...
Corona virus map

Hackers Can Infect Your Computer If You Visit Coronavirus Maps

As the coronavirus outbreak continues to raise eyebrows around the world, the WHO has declared it a global pandemic. Many people are now using...
man using smartphone

Remove These VPN And Ad Blocking Apps That Are Spying On Your Device

Understanding the basis of how app store analytics platforms, for instance, App Annie and Sensor Tower, sparks anxiety. These platforms try to get an...
Android virus

More than one billion Android devices at risk of hacking attacks

Security updates in the android smartphone world are quite limited. Most smartphone companies have rarely been updating their devices once they hit the consumer...
NordVPN app

NordVPN Bug Exposed Critical Customer Data With No Authentication Required

One of the world's popular VPN services, NordVPN, has experienced a critical bug that exposed user information to hackers. The vulnerability evolved around the...
Sophos

Sophos acquired for $3.9 billion in cash

Cybersecurity company Sophos has announced earlier today that it has been acquired. The firm was acquired by Thoma Bravo, a private equity firm in...
PayPal

PayPal Accounts Used By Hackers For Unauthorized Payments

PayPal has fixed a bug that could let attackers perform unauthorized mass payments. The bug, according to ZDNet, lied in PayPal's Google Pay integration. Though...

Nigeria to host the 2020 Cyber Africa Summit

Global B2B events and conference organizer, Tradepass is set to host their exclusive cyber security conference, Cyber Africa Summit (CyFrica) 2020 in Nigeria. The...

Sophos launches ‘Xstream’ version of XG Firewall

Sophos has introduced a new “Xstream” architecture for Sophos XG Firewall with high performance Transport Layer Security (TLS) traffic decryption capabilities that eliminate significant...

[Column] Beware: Gender-based cybercrime

Recent South African news reports have reflected an influx of gender-based crimes targeting women. Heartbreaking and harrowing accounts have flooded the media depicting these...
Google chrome

Google Deletes Hundreds Of Chrome Extensions Involved In Malvertising

Google has axed a slew of Chrome browser extensions that were part of a malicious advertising network. The malicious extensions were uncovered by an...
Google chrome

Google Chrome To Start Blocking Insecure Downloads Soon

At times, we assume the small but very critical warnings shown by browsers. Warnings about visiting sites with no secure protocols, to downloading files...
Android logo

Bluetooth Security Flaw Paves Way For Hackers To Deliver Malware To Millions Of Android...

Android smartphones have allegedly a Bluetooth security flaw that can be exploited to deliver malicious files. Security researchers at ERNW, discovered the Bluetooth flaw,...
Facebook App Login page

Facebook Promises To Improve User Data Security After Several Breaches

Facebook has promised that they will improve their security protocol to ensure user data is safe, after several breaches. The company's pledge recently surfaced...

Strangers Might Have Downloaded Your Private Videos On Google Photos, Google Warns

Cloud storage services are a must have service in this time and age. Many people rely on these services to store their files including...

[Column] Is your personal data safe?

We share a lot more information in the digital world than we used to. Businesses, organisations, close family, friends and acquaintances- all have access...
Sophos

Sophos’ Intercept X secures Android and iOS mobile users from fleeceware applications

Sophos introduced Sophos Intercept X for Mobile with new security capabilities for Chrome OS devices and improved mobile threat defense for Android and iOS devices. The company...
Microsoft logo

250 Million Microsoft Customer Service And Support Records Exposed Online

Microsoft was involved in a data breach with millions of customer service and support records exposed. The report was revealed by the Comparitech security research...
Android virus

Remove These 17 Apps From Your Android Phone ASAP!

You might be used to this kind of news already if you frequent our space. Last year no tangible progress was made in terms...
iPhone X

Your iPhone Can Now Be Used As A 2FA Security Key For Google Accounts

Google has announced that it now supports iPhones to be used as a security key for securing Google accounts. Which means that you can...
TikTok logo

Hackers Could Take Over Your TikTok Account Using SMS

CounterPoint Research has detailed a bug buried inside popular Chinese-based short video message platform TikTok, which could let bad actors take over your account....

Sophos’ MTR proactively hunts for and validates potential threats

Cybercriminals are continuously adapting new methods and increasingly launching hybrid attacks that combine automation with interactive human ingenuity to effectively evade detection. Once they gain a foothold, they’ll employ ‘Living off the...

North Korean hacker Group Reportedly Using Telegram To Steal Cryptocurrency

North Korean linked hacker group dubbed Lazarus has reportedly been using instant messaging platform Telegram to steal cryptocurrency from victims. The report comes from...
Sophos

Sophos enhances MSP Connect to enable its service providers unlock new revenue opportunities

Sophos has announced that it is introducing enhancements to MSP Connect, a program that makes it easier for Managed Service Providers to deploy,...

Safaricom Customers Being Conned Using Telco’s Official Number

Looks like fraudsters are always devising new ways to con people on the Safaricom network. A number of users are now claiming to be...
Facebook Ad Boycott

Phone Numbers Of 267 Million Facebook Users Exposed Online In A Data Breach

Millions of Facebook users have had their data being exposed online. This follows a discovery by security researchers who found an unsecured database containing...

Avoid These 100 Malicious Apps Listed On Google Play

New Android malware has been spotted online and has infected over 100 apps available on the Google Play Store. This is according to a...

Delete ToTok From Your Device, Its Reportedly An Emirati Spy Tool

Popular Chat app ToTok is reportedly a spy tool deployed by the United Arab Emirates government. The chat app, according to a report from the...

Here Is Why You Should Update Your Twitter Android App Immediately

Twitter recently stated that it's Android app had a vulnerability that could allow malicious actors to view private user information. Through this vulnerability, hackers could...

Google Removes Avast And AVG Extensions From Chrome Web Store

Google has kicked Avast and AVG browser extensions out of the Chrome Web store. The two were found guilty of uploading user data which...
Google Chrome

Chrome Now Alerts You When Your Password is Stolen

Google’s latest Chrome version now alerts you when your password is stolen in a data breach. The new feature is available in Chrome version...

[Column] Extending security to the cloud

Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances...

Developers to make API calls with SophosLabs Intelix, a Cloud-Based Threat Intelligence Platform

SophosLabs Intelix, a cloud-based threat intelligence and analysis platform enables developers to build more secure applications. Developers will be able to make API calls...

Sophos upgrades its Cloud Optix to simplify cloud security

Endpoint security leader Sophos has unveiled advancements to its Cloud Optix that automate and simplify the detection and response of cloud security vulnerabilities and...
Virus

Unpatched Android Bug Exploited To Steal Bank Logins

When it comes to security, the Android ecosystem is not safe. Android is the most vulnerable platform out there.  New research from a Norwegian...

$4.4 Billion has been lost this year to cryptocurrency crimes, Report

2019 seems to be a good year for cryptocurrency criminals. According to a report from CipherTrace, victims have lost $4.4 Billion in cryptocurrency in...

How most prevalent and persistent ransomware families attack victims

Sophos has published How Ransomware Attacks, a playbook for defenders that explains how ransomware variants attack and impact victims. The playbook complements the 2020 Threat Report released...
WhatsApp app

WhatsApp bug could allow hackers exploit devices using MP4 files

A unique bug on WhatsApp revealed by the company could let attackers exploit your device using MP4 files. The bug, which was identified as...
Android tablets and smartphones

Pre-installed Android Apps in Phones Can Ship With Security Loopholes – Report

Nobody likes most apps that come pre-installed in Android devices. These apps are not only as good as nothing but also, as it turns...

Google is partnering with security companies to crack down on malicious apps before they...

Android is messed up, not entirely, but there is a never-ending threat to malicious apps being harbored in the official store. While it is not...
Sophos Intercept X

Sophos 2020 Threat Report: Cyber criminals are exploiting malicious Android apps, misconfigured cloud platforms...

Sophos 2020 Threat Report shows how cyber attackers are raising the stakes in ransomware, increasing stealth in malicious Android apps, exploiting misconfiguration in the...
NordVPN logo

NordVPN Announces Plans to Up its Security following Cyberattack

Following last week's reports on NordVPN, the company has announced plans to step up its security. The first move is a long-term strategic partnership...
Google

Just Googling these Celebrities might get you Hacked

Many people love celeb gossip, and that has also turned out as a sweet spot for hackers to prey on unsuspecting users. As it...

Sophos Cloud Optix to provide cloud security vulnerabilities to Amazon Web Services Customers

Sophos today announced the availability of Sophos Cloud Optix on Amazon Web Services (AWS) Marketplace. As a new agentless software-as-a-service (SaaS) offering, Cloud Optix automatically discovers...
NordVPN logo

Popular VPN Service NordVPN Was Hacked

NordVPN one of the popular VPN services that promotes itself as a tool for protecting your online privacy says it was hacked. The company...
phone spy

Android Stalking Apps Use Cases Has Risen By a Staggering 373 Percent in 2019

Stalker apps on Android is not a new thing. These apps let individuals spy on other users’ messages, call information, and GPS locations –...
Virus

Google, Xiaomi and Huawei Devices Fall Victim of a Zero-Day Flaw

Researchers from Googles' Elite bug hunting group, Project Zero, have reported the existence of a bug in Pixel, Xiaomi, and Huawei devices. The vulnerability was...
WhatsApp logo

WhatsApp Glitch Could Allow Hackers To Steal Your Media Files Using GIFs

It is again high time that you should consider updating your WhatsApp. According to a report published by a security researcher, a bug on...

[Column] Why it’s the right time for a career in cybersecurity

The cybersecurity landscape is a battle zone. War is being fought on every front, from email to firewalls to personnel to cracking complex codes,...
iPhone X

New Exploit could allow permanent jailbreaking of millions of iPhone devices

Towards the end of last month, Google’s elite bug-hunting team – Project Zero – released a report on malicious website hijacking the iPhone. But...

Growth in Fintech drives growth in cyberattacks, Kaspersky

Africa’s Fintech sector is booming! According to reports, Africa’s Fintech ecosystem has surged 60% in the last two years and the continent’s Fintech firms have...

Remove these VPN apps from your Android phone immediately

By now, you are pretty much familiar with the pattern. Google keeps fighting malicious actors on the Playstore, but still, the platform remains a...
A flying drone

Drone Attacks Slice Saudi Arabia’s Oil Production Plant Outputs by Half

Along the weekend, Saudi Arabia has been seen as a production cut on its oil production volume country-wide. According to the Financial Times, the...
lock infront of computer codes

LastPass Fixes a bug that could let Malicious website Extract your last used Password

LastPass has released details of a vulnerability on the platform that exposed credentials used on a previous website. ZDNet reported that the bug was...

Internet Solutions Sets up a Ksh.20M Cyber Threat Intelligence Centre in Kenya

Internet Solutions has set up a Ksh.20 million Cyber Threat Intelligence Centre in Kenya. The company also says will be looking to invest an...
Facebook CEO Mark Zuckeerberg

Facebook Confirms Millions of users’ Phone Numbers have been Exposed Online

Facebook has confirmed the news reports that millions of phone numbers linked with Facebook user accounts have been exposed. The company confirmed to an...
As much as 70 percent of IoT devices comprise security flaws, which means devices that you own could get hacked by online criminals too.

South Africa experiencing a disturbingly high number of data breaches

Credit reporting agency Equifax has agreed to pay more than $677m to regulators to settle claims from a data breach that exposed the personal...
Apple back iPhone

iPhones have been Quietly Hacked by Malicious Websites for Years, says Google

In what appears to be one of the deadliest attacks ever to grace the iOS land, Google has revealed a report stating hacked websites...
Google chrome

Google Issues Chrome Update to Patch This Serious Security Flaw

If you're a regular user of Google's Chrome independent of the desktop platform, it is high time that you should be updating your browser....

Why You Should Upgrade to iOS 12.4.1 ASAP!

If there is a company that has been working hard to keep its mobile OS out of trouble with hackers is Apple. The company...
airpods-bluetooth-device-phone-accessories

Bluetooth has a Serious Flaw that Exposes Millions of Devices Vulnerable to Attacks

Cybersecurity researchers have detailed a report that showcases a flaw in Bluetooth dubbed KNOB (Key Negotiation Of Bluetooth). KNOB allows an attacker to break the...

Google Report Reveals Users Stick to Passwords that have Already been Hacked

In this digital era, secure passwords are vital in protecting your personal information, not entirely, but at least you did your part. At times...

CONNECT WITH US

5,681FansLike
1,253FollowersFollow
3,375FollowersFollow

TRENDING

Ngao Credit: Here’s how to take advantage of our Import Financing...

Ngao Credit Import Financing: If you have plans to purchase your dream car this year, chances are that you have considered import financing.  Import financing...

24Bit Podcast Ep 24: Buying Smartphones Through Device Financing Plans

In this latest episode of our 24Bit podcast, Emmanuel Chenze, Nick Kanali and Dickson Otieno discuss different device financing plans in Kenya including Lipa...

EDITOR'S PICK

Nokia Phone Maker HMD Global raises $230 million funding from Google,...

HMD Global, the company behind new Nokia phones, has secured $230 million in new funding from its strategic investor partners including Google, Qualcomm and...