CYBER SECURITY

Cyber security news updates and tips on why it is critical for an enterprise to utilize cybersecurity best practices to avoid common cyber security threats.

Zoom Room

Zoom is Bringing The Real End-to-End Encryption This Time, But There’s a Catch

Zoom is finally taking the big leap to bring an end to end encryption (E2EE) as it continues its 90-day challenge to beef up...
Mozilla Firefox Logo

FireFox Latest Update Strengthens its Password Manager for Improved Privacy and Security

Mozilla has launched a new version of its Firefox browser – Firefox 76. In the latest update, Mozilla has focused primarily on beefing up...

Xiaomi Accused Of Collecting Browsing Data From Their Web Browsers

A recent shocking report from Forbes’s cybersecurity contributor and associate editor, Thomas Brewster, reveals that Xiaomi browsers are sending browsing data to Xiaomi-rented remote...
Google Chrome logo

Google Plans To Remove Spammy Add-ons from Chrome’s Web Store

Google is taking matters in its hands by retiring spammy chrome add-ons available on the web-store. Since its inception in 2011, Chrome's Webstore has...
Android logo

Android Vendors Are Making Tangible Progress in Issuance of Security Patches

Android devices, especially non-premium ones, have long been left out of the cold from critical security patches, but that has been changing. Thanks for...
Virus

Malware infects 1.69M Android Handsets in South Africa, Report

Secure-D from mobile tech company Upstream detected 1.69 million malware-infected Android devices in South Africa last year. Within many popular apps, Malware is lurking...

Sextortion Money Trail Leads to Underbelly of Cybercriminal Activity, SophosLabs Report

Sophos has published a SophosLabs article, Following the Money in a Massive “Sextortion” Spam Scheme, that shows how the funds extracted from victims led...
person wearing scream mask and-black hoodie

Hackers Attacked Businesses 22 Million Times In The Past 7 Days Globally, Report

Staying and home and betting on the internet to get most of the daily activities done that during the pre-Covid19 period needed one to...
Zoom logo

Over 500,000 Stolen Zoom Accounts Sold Online For Cents

Over 500,000 stolen Zoom accounts have been spotted online being sold for cents each and sometimes even free, reports BleepingComputer. According to Cybersecurity intelligence...

Sophos Reports discovers 30 Fleeceware Apps Targeting iPhone users

Sophos has published a new report showing how Apple device users are being targeted by applications that overcharge users through costly subscriptions or unscrupulous...
Zoom Office

Google Joins Other Organizations In Banning Zoom Over Security Concerns

Zoom is a security mess, and that has been proved over and over in the past few weeks. Last week, the company’s CEO, Eric...
Zoom Office

Zoom Freezes Feature Updates Committing To Improve Security And Privacy As Scrutiny Increases

Over the past three months, Zoom has seen its daily usage numbers explode. Zoom CEO Eric S. Yuan says that the platform had just...

Watch out! Scummy scammers target home deliveries

If you’re sitting at home right now, sheltering from the coronavirus pandemic – and there’s a good chance you are – then you are...
Zoom Office

Zoom Isn’t End To End Encrypted, Report Reveals

Popular video conferencing Zoom has long stated that it’s end to end encrypted, but that is not the case, a report revealed. Typically, end...

Sophos tracks significant COVID-19 related cyber-scams

Due to the ongoing global coronavirus (COVID-19) pandemic, cyber criminals are taking advantage of unsuspecting users to breach their system. This might have a...
Apple logo art

Apple Safari Browser Starts Blocking Third-Party Cookies By Default

Apple Safari browser 's latest update blocks third-party cookies by default. The update is a big privacy leap, especially to Safari's reputation in the...

Are you working at home due to coronavirus? Secure yourself with these few tips

Many if not most organisations have already crossed the “working from home”, or at least the “working while on the road” bridge. If you’re on...
Corona virus map

Hackers Can Infect Your Computer If You Visit Coronavirus Maps

As the coronavirus outbreak continues to raise eyebrows around the world, the WHO has declared it a global pandemic. Many people are now using...
man using smartphone

Remove These VPN And Ad Blocking Apps That Are Spying On Your Device

Understanding the basis of how app store analytics platforms, for instance, App Annie and Sensor Tower, sparks anxiety. These platforms try to get an...
Android virus

More than one billion Android devices at risk of hacking attacks

Security updates in the android smartphone world are quite limited. Most smartphone companies have rarely been updating their devices once they hit the consumer...
NordVPN app

NordVPN Bug Exposed Critical Customer Data With No Authentication Required

One of the world's popular VPN services, NordVPN, has experienced a critical bug that exposed user information to hackers. The vulnerability evolved around the...

Sophos acquired for $3.9 billion in cash

Cybersecurity company Sophos has announced earlier today that it has been acquired. The firm was acquired by Thoma Bravo, a private equity firm in...
PayPal

PayPal Accounts Used By Hackers For Unauthorized Payments

PayPal has fixed a bug that could let attackers perform unauthorized mass payments. The bug, according to ZDNet, lied in PayPal's Google Pay integration. Though...

Nigeria to host the 2020 Cyber Africa Summit

Global B2B events and conference organizer, Tradepass is set to host their exclusive cyber security conference, Cyber Africa Summit (CyFrica) 2020 in Nigeria. The...

Sophos launches ‘Xstream’ version of XG Firewall

Sophos has introduced a new “Xstream” architecture for Sophos XG Firewall with high performance Transport Layer Security (TLS) traffic decryption capabilities that eliminate significant...

[Column] Beware: Gender-based cybercrime

Recent South African news reports have reflected an influx of gender-based crimes targeting women. Heartbreaking and harrowing accounts have flooded the media depicting these...
Google chrome

Google Deletes Hundreds Of Chrome Extensions Involved In Malvertising

Google has axed a slew of Chrome browser extensions that were part of a malicious advertising network. The malicious extensions were uncovered by an...
Google chrome

Google Chrome To Start Blocking Insecure Downloads Soon

At times, we assume the small but very critical warnings shown by browsers. Warnings about visiting sites with no secure protocols, to downloading files...
Android logo

Bluetooth Security Flaw Paves Way For Hackers To Deliver Malware To Millions Of Android...

Android smartphones have allegedly a Bluetooth security flaw that can be exploited to deliver malicious files. Security researchers at ERNW, discovered the Bluetooth flaw,...
Facebook App Login page

Facebook Promises To Improve User Data Security After Several Breaches

Facebook has promised that they will improve their security protocol to ensure user data is safe, after several breaches. The company's pledge recently surfaced...

Strangers Might Have Downloaded Your Private Videos On Google Photos, Google Warns

Cloud storage services are a must have service in this time and age. Many people rely on these services to store their files including...

[Column] Is your personal data safe?

We share a lot more information in the digital world than we used to. Businesses, organisations, close family, friends and acquaintances- all have access...

Sophos’ Intercept X secures Android and iOS mobile users from fleeceware applications

Sophos introduced Sophos Intercept X for Mobile with new security capabilities for Chrome OS devices and improved mobile threat defense for Android and iOS devices. The company...
Microsoft logo

250 Million Microsoft Customer Service And Support Records Exposed Online

Microsoft was involved in a data breach with millions of customer service and support records exposed. The report was revealed by the Comparitech security research...
Android virus

Remove These 17 Apps From Your Android Phone ASAP!

You might be used to this kind of news already if you frequent our space. Last year no tangible progress was made in terms...
iPhone X

Your iPhone Can Now Be Used As A 2FA Security Key For Google Accounts

Google has announced that it now supports iPhones to be used as a security key for securing Google accounts. Which means that you can...
TikTok logo

Hackers Could Take Over Your TikTok Account Using SMS

CounterPoint Research has detailed a bug buried inside popular Chinese-based short video message platform TikTok, which could let bad actors take over your account....

Sophos’ MTR proactively hunts for and validates potential threats

Cybercriminals are continuously adapting new methods and increasingly launching hybrid attacks that combine automation with interactive human ingenuity to effectively evade detection. Once they gain a foothold, they’ll employ ‘Living off the...

North Korean hacker Group Reportedly Using Telegram To Steal Cryptocurrency

North Korean linked hacker group dubbed Lazarus has reportedly been using instant messaging platform Telegram to steal cryptocurrency from victims. The report comes from...

Sophos enhances MSP Connect to enable its service providers unlock new revenue opportunities

Sophos has announced that it is introducing enhancements to MSP Connect, a program that makes it easier for Managed Service Providers to deploy,...

Safaricom Customers Being Conned Using Telco’s Official Number

Looks like fraudsters are always devising new ways to con people on the Safaricom network. A number of users are now claiming to be...
facebook logo

Phone Numbers Of 267 Million Facebook Users Exposed Online In A Data Breach

Millions of Facebook users have had their data being exposed online. This follows a discovery by security researchers who found an unsecured database containing...

Avoid These 100 Malicious Apps Listed On Google Play

New Android malware has been spotted online and has infected over 100 apps available on the Google Play Store. This is according to a...

Delete ToTok From Your Device, Its Reportedly An Emirati Spy Tool

Popular Chat app ToTok is reportedly a spy tool deployed by the United Arab Emirates government. The chat app, according to a report from the...

Here Is Why You Should Update Your Twitter Android App Immediately

Twitter recently stated that it's Android app had a vulnerability that could allow malicious actors to view private user information. Through this vulnerability, hackers could...

Google Removes Avast And AVG Extensions From Chrome Web Store

Google has kicked Avast and AVG browser extensions out of the Chrome Web store. The two were found guilty of uploading user data which...
Google Chrome

Chrome Now Alerts You When Your Password is Stolen

Google’s latest Chrome version now alerts you when your password is stolen in a data breach. The new feature is available in Chrome version...

[Column] Extending security to the cloud

Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances...

Developers to make API calls with SophosLabs Intelix, a Cloud-Based Threat Intelligence Platform

SophosLabs Intelix, a cloud-based threat intelligence and analysis platform enables developers to build more secure applications. Developers will be able to make API calls...

Sophos upgrades its Cloud Optix to simplify cloud security

Endpoint security leader Sophos has unveiled advancements to its Cloud Optix that automate and simplify the detection and response of cloud security vulnerabilities and...
Virus

Unpatched Android Bug Exploited To Steal Bank Logins

When it comes to security, the Android ecosystem is not safe. Android is the most vulnerable platform out there.  New research from a Norwegian...

$4.4 Billion has been lost this year to cryptocurrency crimes, Report

2019 seems to be a good year for cryptocurrency criminals. According to a report from CipherTrace, victims have lost $4.4 Billion in cryptocurrency in...

How most prevalent and persistent ransomware families attack victims

Sophos has published How Ransomware Attacks, a playbook for defenders that explains how ransomware variants attack and impact victims. The playbook complements the 2020 Threat Report released...
WhatsApp app

WhatsApp bug could allow hackers exploit devices using MP4 files

A unique bug on WhatsApp revealed by the company could let attackers exploit your device using MP4 files. The bug, which was identified as...
Android tablets and smartphones

Pre-installed Android Apps in Phones Can Ship With Security Loopholes – Report

Nobody likes most apps that come pre-installed in Android devices. These apps are not only as good as nothing but also, as it turns...

Google is partnering with security companies to crack down on malicious apps before they...

Android is messed up, not entirely, but there is a never-ending threat to malicious apps being harbored in the official store. While it is not...
Sophos Intercept X

Sophos 2020 Threat Report: Cyber criminals are exploiting malicious Android apps, misconfigured cloud platforms...

Sophos 2020 Threat Report shows how cyber attackers are raising the stakes in ransomware, increasing stealth in malicious Android apps, exploiting misconfiguration in the...
NordVPN logo

NordVPN Announces Plans to Up its Security following Cyberattack

Following last week's reports on NordVPN, the company has announced plans to step up its security. The first move is a long-term strategic partnership...
Google

Just Googling these Celebrities might get you Hacked

Many people love celeb gossip, and that has also turned out as a sweet spot for hackers to prey on unsuspecting users. As it...

Sophos Cloud Optix to provide cloud security vulnerabilities to Amazon Web Services Customers

Sophos today announced the availability of Sophos Cloud Optix on Amazon Web Services (AWS) Marketplace. As a new agentless software-as-a-service (SaaS) offering, Cloud Optix automatically discovers...
NordVPN logo

Popular VPN Service NordVPN Was Hacked

NordVPN one of the popular VPN services that promotes itself as a tool for protecting your online privacy says it was hacked. The company...
phone spy

Android Stalking Apps Use Cases Has Risen By a Staggering 373 Percent in 2019

Stalker apps on Android is not a new thing. These apps let individuals spy on other users’ messages, call information, and GPS locations –...
Virus

Google, Xiaomi and Huawei Devices Fall Victim of a Zero-Day Flaw

Researchers from Googles' Elite bug hunting group, Project Zero, have reported the existence of a bug in Pixel, Xiaomi, and Huawei devices. The vulnerability was...
WhatsApp logo

WhatsApp Glitch Could Allow Hackers To Steal Your Media Files Using GIFs

It is again high time that you should consider updating your WhatsApp. According to a report published by a security researcher, a bug on...

[Column] Why it’s the right time for a career in cybersecurity

The cybersecurity landscape is a battle zone. War is being fought on every front, from email to firewalls to personnel to cracking complex codes,...
iPhone X

New Exploit could allow permanent jailbreaking of millions of iPhone devices

Towards the end of last month, Google’s elite bug-hunting team – Project Zero – released a report on malicious website hijacking the iPhone. But...

Growth in Fintech drives growth in cyberattacks, Kaspersky

Africa’s Fintech sector is booming! According to reports, Africa’s Fintech ecosystem has surged 60% in the last two years and the continent’s Fintech firms have...

Remove these VPN apps from your Android phone immediately

By now, you are pretty much familiar with the pattern. Google keeps fighting malicious actors on the Playstore, but still, the platform remains a...
A flying drone

Drone Attacks Slice Saudi Arabia’s Oil Production Plant Outputs by Half

Along the weekend, Saudi Arabia has been seen as a production cut on its oil production volume country-wide. According to the Financial Times, the...
lock infront of computer codes

LastPass Fixes a bug that could let Malicious website Extract your last used Password

LastPass has released details of a vulnerability on the platform that exposed credentials used on a previous website. ZDNet reported that the bug was...

Internet Solutions Sets up a Ksh.20M Cyber Threat Intelligence Centre in Kenya

Internet Solutions has set up a Ksh.20 million Cyber Threat Intelligence Centre in Kenya. The company also says will be looking to invest an...
Facebook CEO Mark Zuckeerberg

Facebook Confirms Millions of users’ Phone Numbers have been Exposed Online

Facebook has confirmed the news reports that millions of phone numbers linked with Facebook user accounts have been exposed. The company confirmed to an...
As much as 70 percent of IoT devices comprise security flaws, which means devices that you own could get hacked by online criminals too.

South Africa experiencing a disturbingly high number of data breaches

Credit reporting agency Equifax has agreed to pay more than $677m to regulators to settle claims from a data breach that exposed the personal...
Apple back iPhone

iPhones have been Quietly Hacked by Malicious Websites for Years, says Google

In what appears to be one of the deadliest attacks ever to grace the iOS land, Google has revealed a report stating hacked websites...
Google chrome

Google Issues Chrome Update to Patch This Serious Security Flaw

If you're a regular user of Google's Chrome independent of the desktop platform, it is high time that you should be updating your browser....

Why You Should Upgrade to iOS 12.4.1 ASAP!

If there is a company that has been working hard to keep its mobile OS out of trouble with hackers is Apple. The company...
airpods-bluetooth-device-phone-accessories

Bluetooth has a Serious Flaw that Exposes Millions of Devices Vulnerable to Attacks

Cybersecurity researchers have detailed a report that showcases a flaw in Bluetooth dubbed KNOB (Key Negotiation Of Bluetooth). KNOB allows an attacker to break the...

Google Report Reveals Users Stick to Passwords that have Already been Hacked

In this digital era, secure passwords are vital in protecting your personal information, not entirely, but at least you did your part. At times...
DSLR camera

Your DSLR Camera is Also Vulnerable to Ransomware Attacks

Would you have ever imagined that cameras can be susceptible to attacks? I bet you’d think they are not. The fact that cameras do...
Apple back iPhone

Apple will Offer Security Researchers Special “Unlocked” iPhones for Bug Hunting on iOS.

Following the launch of the Apple Bug Bounty program for iOS back in September 2016, the company wants to even cement its research program...
WhatsApp for Android

WhatsApp Flaw Could Allow Attackers to Alter Your Messages

Facebook's popular instant messaging app WhatsApp has yet another series of flaws that could let attackers alter your messages.  The flaws have been made...
Apple's Logo Background reflection

iMessage has a Mysterious Security Bug That Apple Is Yet to Patch

Two Google Project Zero bug hunters (Silvanovich and Samuel Groß) have revealed details on an iOS security flaw that could be capitalized on via...
defaced Systech-website

Russian Intelligence Agency Hacked! Over 7.5TB of Data Deleted

Russian Intelligence Agency (FSB) has been one of the most prominent hacker group that ever grazed the internet. However, this time around the odds...
Apple Logo

NSO Group’s Malware Now Capable of Spying on Data Stored in iCloud, Reports

The NSO Group, a famous Israel security firm has reportedly developed tools which can be able to scrape data from cloud services. This could...

IT Managers are overwhelmed with Cyberattacks and Struggling to Keep Up, Sophos Survey

Sophos today announced the findings of its global survey, The Impossible Puzzle of Cybersecurity, which reveals IT managers are inundated with cyberattacks coming from...

Report Claims China Installs Malware on Tourists’ Phones At The Border

Amid the stalled China-US trade wars that leveraged Huawei as the click bait, reports indicate the Chinese government has been forcing foreigners to download...

Unites States government considers banning end-to-end encryption

Implementation of end to end encryption in various user engagement platforms has been fantastic in taking care of online privacy. The case is different...
Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

Chinese hackers targeted big tech companies to steal trade secrets from enterprise customers

A cybersecurity firm has recently revealed information about Chinese hackers who have been hacking big telco companies intending to extract personal and corporate information...

Safaricom ups the game against fraud

Safaricom has today unveiled its new plans for tackling fraud activities on its platforms. Kenya’s largest telco reported that through the implementation of their...
Mozilla Firefox

You Have To Update Your Firefox Browser Now

A zero-day attack has hit the Firefox browser. If you run either Firefox 67.0.3 and Firefox ESR 60.7.1 or maybe you’re not sure on...

Telegram blames China for DDos attacks

Durov the founder and owner of secure messaging platform Telegram has reported the app has been hit by gazillions of "Garbage requests" that stopped...

Sophos Acquires Rook Security to Provide Managed Detection and Response

Sophos, today announced that it has acquired Rook Security, a pioneer and leader in managed detection and response (MDR) services. Rook Security provides a...
Sophos Intercept X

Sophos launches Intercept X for Server with EDR to help businesses battle new blended...

EndPoint security leader Sophos has today announced that it is launching Intercept X for Server with Endpoint Detection and Response (EDR) to help businesses...

Someone is buying a malware-loaded laptop for $1.345 million

If you thought the world is crazy-it’s not but people are. Last week a laptop loaded with malware for auctioned at an asking price...

Google stored plaintext passwords for a subset of G-Suite users since 2005

To say that our online data is secure on any website on the internet is a mere hoax. However, companies have at least developed...
google 2FA challenge

Google: 2FA blocks 100% of automated bot attacks

Think 2FA is a joke? This post is for you. The new research done by Google is something you should know. Google earlier this year...
Kaspersky Lab

Kaspersky Lab is setting up a new office in Kigali

Kaspersky Lab is opening a new office in Kigali, Rwanda. The cybersecurity and antivirus provider has announced plans to set up the new office...
Truecaller

Truecaller user data selling on the dark web for over KES 200,000

TrueCaller Indian user data has been seen selling on the dark web for over KES 200,000. The data, according to a report is that...
[Column] Data Security; embracing autonomy and intelligent machines

[Column] Data Security; embracing autonomy and intelligent machines

By Christine Ambetsa, Regional Applications Sales Leader - East Africa at Oracle CIOs are operating in a state of heightened awareness. Their mission-critical systems are...
WhatsApp app

WhatsApp voice call feature used by attackers to inject malicious spyware

On Monday, WhatsApp, a Facebook-owned instant messaging service, has reported the existence of vulnerabilities that allowed hackers to spy on its users. WhatsApp reported that...

MTN unveils Managed Security as a service solution for Kenyan enterprises

MTN Business has today launched MTN Managed Security as a service solution for its enterprise customers in Kenya. The product, according to MTN aims...

CONNECT WITH US

5,203FansLike
1,254FollowersFollow
3,290FollowersFollow
800SubscribersSubscribe

TRENDING

Tech for humanity: Preparing for the next phase

ICT has been critical to fighting the Covid-19 pandemic and transforming society over the long term. But the key to progress is laying the...

24Bit Podcast Episode 21: Our Experience with the Huawei Y7p (No...

In this latest episode of our 24Bit podcast Emmanuel Chenze, Nick Kanali and Dickson Otieno discuss the Huawei Y7p which is Huawei first device...

EDITOR'S PICK