CYBER SECURITY

Cyber security news updates and tips on why it is critical for an enterprise to utilize cybersecurity best practices to avoid common cyber security threats.

Interview: The State of Cyber Security in Kenya

Cyber Security has become a great concern for most organizations across the globe, Kenya included. In fact, according to The 2015 Cyber Security Report by...

Kenya Commercial Bank barred from using its banking software over piracy

Kenya Commercial Bank (KCB) Group has been barred from using a core banking software over IP infringement and software piracy.  This is after Nagalakshmi...

New Multi-featured Mobile Trojan Loapi Discovered

Kaspersky Lab researchers have identified a new intriguing malware with multiple modules, which allows for an almost endless number of malicious features - from...

The war on cybercrime – why all Kenyan organisations need to play their part

By Brian Pinnock, Mimecast Africa and the Middle East Cyberattacks in Kenya are on the rise. There’s barely a day that goes by where you...

National Bank of Kenya loses Ksh.29 Million to hackers.

The National Bank of Kenya has lost about Ksh.29 million to hackers. The hacking incident is said to have happened on Wednesday 17th. “We...

3 differences between Petya and WannaCry Ransomware

How the cyberattacks differ and what it means for ransomware security The world has recently come under attack from not one but two separate globe-trotting...

Kenyan companies accruing massive losses amidst rising cyberattacks

Banks have become the leading target of cybercrime as people increasingly adopt the use of financial technology. In fact, according to Serianu’s Cybersecurity Report...

Cybersecurity: Hacking the vote -Should Alshabaab make us worried about 2017 polls?

Cybersecurity is one of the biggest challenges Kenya has been trying to fight. Reports of government institutions being hacked by unknown people have been...

Porn on the move: In 2017, over 25% of users hit by mobile malware...

In 2017, 25.4% of mobile users who encountered malware - over 1.2 million people - were attacked by malicious programs that used adult content...
Sophos Intercept X installs alongside existing endpoint security software from any vendor, immediately boosting endpoint protection by stopping malicious code before it executes.

Sophos unveils Sophos Intercept X to extend its Next-Generation Endpoint Security Capabilities

Sophos has announced has unveiled its next-generation endpoint security product that stops zero-day malware, unknown exploit variants and stealth attacks. Known as Sophos Intercept...

Kaspersky Lab research: Internet users yet to master proper password habits

Internet users across the globe are yet to master how to use passwords effectively to protect themselves online. Research from Kaspersky Lab has shown...

Sophos Announces Unified Security and Control solution for Mobile Devices, Laptops and IoT devices

  Sophos has today announced its the latest version of its Enterprise Mobility Management (EMM) solution. Known as Sophos Mobile 7, this new version extends containerization...

ESET Releases 2018 Report: Predicts Trends in Cybersecurity

Global cybersecurity services leader ESET has warned that the ransomware menace is likely to continue into 2018 with further growth in incidents and risks...

The Mobile Revolution And The Struggle For Identity In The Digital Age

By Eugene Muhando (@e_muhando), Nairobi. Life is a mystery, so we are told. Just take an adventure and realize the beauty of discovering something new....

DDoS in the cloud: who’s watching your back?

Cloud computing is seeing a steady and undeniable  growth in adoption across all types of industries. Growing just as progressively, however, is the extent to...

3 ways you can keep yourself and your devices protected

Connecting to the Internet today has become a norm for most of us, as we enjoy the convenience of public Wi-Fi, using smartphones to...

Kaspersky Lab Presents Cybersecurity Trends in the META Region

Kaspersky Lab brought together company experts, journalists and business guests from the Middle East, Turkey, and Africa for its annual Cyber Security Weekend that...

Enlisting blockchain technology in the war against DDoS onslaughts

Distributed Denial of Service (DDoS) attacks are certainly on the rise. Arbor’s 13th Annual Worldwide Infrastructure Security Report showed that 33 percent of surveyed...

Egypt Launches Digital Forensic Lab to combating software piracy.

The government of Egypt has announced that it is setting up a specialized digital forensic lab for Intellectual Property as part of its enforcement...

Opinion: Taking enterprise security to the board

It’s that time of year, again, with many companies busying themselves in the art of budgeting and forecasting for 2018. In some companies, this means...
The R&D center will be focused on developing data analysis and machine learning technologies for the company’s enterprise solutions offering. Photo Source: Kaspersky Lab Blog

Kaspersky Lab opens its first Research and Development office in Europe

Kaspersky Lab has announced the opening of its first European research and development (R&D) center, in Dublin, Ireland. The company initial investment into the...

Female Journalists in Kenya to be trained on online safety

With more users now spending time online, the ways they can get compromised on the internet have gotten more numerous and sophisticated. From phishing...

Clues are Dead – Kaspersky Lab’s Threat Predictions 2017

Kaspersky Lab’s discovery in 2016 of an APT-able to create new tools for each victim has effectively killed off ‘Indicators of Compromise’ as a...

Global Wannacry Ransomware Attack – Infographic

Ransomware WannaCrypt makes you cry? Struggling to survive from this large-scale cyber attack? This inforgraphic below lets you understand the history of WannaCrypt virus...

5 Ways to Secure Your Identity in the Data Breach Era

By Patrick Rono, Security Technical Professional- IBM East Africa With major cybersecurity incidents dominating headlines for the past several years, consumers are well aware of...

How to defend your business from insider threat

Insider threats are like tumors in a person’s body. Fortunately for stakeholders, insider threat does not involve uncontrollable factors and can be prevented before...
Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

Be cyber-savvy: Employees should not be secondary to technology

“Our employees are our greatest asset” is a phrase that continues to be published far and wide in a plethora of company profiles, human...

ESET signs M.O.U with @iLabAfrica centre to fight cybercrime in Kenya

Internet security company ESET East Africa has signed a memorandum of understanding (M.O.U) with Strathmore’s @iLabAfrica aimed at enhancing the fight against cybercrime in...

Cisco 2018 Annual Cybersecurity Report: Organisations now investing in Machine Learning and AI...

Security leaders are increasingly relying on tools that use AI and machine learning to defend against cybersecurity threats. This is according to the Cisco...

Artificial Intelligence: Your Bot Will See You Now

Next time you contact your insurer there is a good chance that you will be dealing with Artificial Intelligence (AI). Insurers are starting to...

Twitter CEO Jack Dorsey’s Twitter account hit by hackers

No one is immune to to getting their social media accounts hacked. Last month we told how the most followed account on Twitter Katy...

Sophos Server Protection products now optimized with CryptoGuard Technology

IT security firm Sophos has announced that its next-generation anti-ransomware 'CryptoGuard' technology is now available with its ‘Sophos Server Protection’ products. With this optimization,...

Hackers break into Acer’s website, Compromises Credit Card Details of 34,500 Customers

In yet another massive security breach to be reported this year, data of of as many as 34,500 Acer products customer might have been compromised....

ESET announces free online cybersecurity training for businesses in Kenya

Internet security company ESET East Africa has announced the availability of free cybersecurity training for businesses and their employees in Kenya. The ESET Cybersecurity Awareness...

Opinion: Cloud computing evolves, becomes enterprise cloud-as-a-service

Over the past two decades or so, the concept of cloud computing has evolved dramatically, as new data centre and networking technologies came to...

Safaricom Customers Being Conned Using Telco’s Official Number

Looks like fraudsters are always devising new ways to con people on the Safaricom network. A number of users are now claiming to be...

Businesses at risk due to unidentified network traffic according Sophos Global Survey

IT managers from mid-sized businesses cannot identify 45 percent of their organization’s network traffic.  In fact, nearly one-in-four cannot identify 70 percent of this...

French firm OT-Morpho says IEBC voting system was not hacked

OT-Morpho has dismissed claims that the electronic system it supplied to the Independent Electoral and Boundaries Commission (IEBC) to biometrically identify voters during Kenya’s...

ICT CS Joe Mucheru urges private sector to boost investment in cybersecurity

ICT Ministry Cabinet Sectretary Mr. Joe Mucheru, has urged the private sector to bolster investment in cybersecurity to curb the growing incidences of cybercrime...

Something Phishy: How to Identify and Avoid Phishing Scams

By Harish Chib, VP MEA Sophos. Phishing is one of the most common attack vectors for hackers who exploit end-user behavior as the weakest link in...

Cyber Crime: Are your online banking transactions safe?

'Checking your account balance, paying bills and managing your finances… Nowadays, it is pretty normal to do all those things online.... But are you...

Kaspersky Lab Warns of Cybersecurity for Industrial Facilities and Connected Devices in Smart Cities

Kaspersky Lab has warned of Cybersecurity for Industrial Facilities and Connected Devices in Smart Cities. This warning  was made during Kaspersky Lab’s annual Cyber Security...
Kaspersky Lab has signed a memorandum of understanding (MoU) with the Smart Africa Alliance, to raise awareness on cybersecurity

Kaspersky Lab and Smart Africa sign MoU to raise awareness on cybersecurity in Africa

  Kaspersky Lab has signed a memorandum of understanding (MoU) with the Smart Africa Alliance, to raise awareness on cybersecurity. The MOU will also see...
As much as 70 percent of IoT devices comprise security flaws, which means devices that you own could get hacked by online criminals too.

Guest Post: Do You Own One of the Most Hackable Devices?

An IT solutions company in the Philippines, as well as other cybersecurity firms, have stressed that everything connected to the Internet is hackable. From...

The annual CIO East Africa Security Summit kicks off in Nairobi

CIO East Africa in conjunction with the International Data Group (IDG), yesterday held its second annual Africa Security Summit at the Norfolk Hotel, Nairobi....
Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

SMEs Should Partner with Cyber Security Specialists to Prevent Loss of Billions

Imagine waking up one beautiful Monday only to realize that your website has been hacked. Your online accounts, your most precious work and even...

User lock-down or education? Just one of today’s cybersecurity issues in a rapidly evolving...

According to the recent PwC report, The Global State of Information Security Survey 2018, companies around the globe are becoming more reliant on cyber...

Cyber Security and The Impending Era of Connected Devices

By Jacob Haney One of the major problems that we see with the sudden boom in connected devices is that information security systems are not...

Liquid Telecom report highlights cybersecurity concerns for African businesses

Liquid Telecom has released new Cybersecurity & Data Protection Report identifying the latest cyber security and data protection concerns and challenges facing African businesses....

ESET supports call for standardized cybersecurity breach reporting

Internet security company ESET East Africa has added its voice to the call for legislation to compel organizations to share or release information to...

Banks expenditure on IT Security is 3x Higher than Non-Financial Organisations

Financial institutions are under pressure to ramp up security, with trends such as the increased take-up of mobile banking putting banks’ IT infrastructure defenses...

Android Security: Mobiles Phones Spying is it Legal or not?

Smart phone is an individual’s property and it contains most personal and private data of a person. Every person has legal right to secure...

Lack of education on ICT to blame for growing cyber attacks on Insurance and...

Insurance and banking services sectors in the country need to enhance the pace of deployment of secure Information Communication Technology (ICT) practices in their...

Sophos says its XG firewall is secure from WannaCry Ransomware

Security firm Sophos has issued a detection update for its customers after the WannaCry ransomware attack last week on Friday. The malware is reported...

New Switcher Android Trojan Hacks Routers, Hijacks Traffic to other websites

Kaspersky Lab experts recently uncovered a remarkable evolution in Android OS malware: the Switcher Trojan. The Newly-discovered Trojan uses unsuspecting Android device users as...

Don’t be a sitting duck against #IoT threats

As the Internet of Things (IoT) continues to gain traction, organizations will have to reassess their security practices to accommodate the increase in security...

Opinion: Of banks and cybersecurity

If there’s one industry we should be most concerned about when it comes to cyber criminals and security, it’s the one that looks...

Nokia malware report reveals new all-time high in mobile device infections and major IoT...

The latest Threat Intelligence Report by Nokia has revealed a new all-time high in mobile device malware infections, a sharp increase in compromised smartphones and...
Sophos Intercept X

Sophos introduces Sophos Intercept X for Server To Protect Businesses Against Cyber Threats

Sophos has today announced Sophos Intercept X for Server, its next-generation server protection with predictive deep learning technology that provides constantly evolving security against...
Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

More than 40% of ICS computers were attacked in H1 2018

More than 40% of all industrial control system (ICS) computers protected by Kaspersky Lab solutions were attacked by malicious software at least once during...
One of the most valuable assets you have as a business owner is your server, and IT security issues like a data breach is a huge business nightmare.

Guest Post: 7 Ways to Protect Your IT Infrastructure from a Data Breach

Succumbing to cyber attacks can hurt your brand image. Fortunately, there are many techniques to infiltrate your systems such as having an IT security...
As much as 70 percent of IoT devices comprise security flaws, which means devices that you own could get hacked by online criminals too.

University of Nairobi Twitter Account and Blog compromised by hackers

No one is immune to getting their social media accounts or even website being hacked. Be it, individuals or corp-orates, all them have always...

Sophos expands its partner program to enables partners to secure Cloud platforms

Sophos is expanding its Partner Program for its channel partners to now training, certification and financial incentives that will help them support customers using...

Banks globally still finding it hard to manage online financial fraud

Banks and payment organizations globally are still finding it difficult to manage online financial fraud in today’s connected and complex technological landscape. This is...

How secure is your data, really?

More than 554 million data records were stolen during the first half of 2016, a 31% increase from the previous six months – and that...

Zcash Fever: Criminals Exploiting Users PCs to Make Profits Mining Cryptocurrency

At the end of October, the new cryptocurrency Zcash was launched. It is positioned by its creators as a more secure alternative to Bitcoin....

Hajime malware is affecting the Internet of Things devices worldwide

Kaspersky Lab has published the results of its investigation into the activity of Hajime – a mysterious evolving Internet of Things (IoT) malware that...

‘Excellent Job, Thanks’: You May Never Know about the Cybersecurity Incidents Caused by Your...

Employees hide IT security incidents in 40% of businesses around the world, that’s according to a new report from Kaspersky Lab and B2B International,...
As much as 70 percent of IoT devices comprise security flaws, which means devices that you own could get hacked by online criminals too.

NukeBot trojan threatens to steal details of customer online banking transactions

Kaspersky Lab researchers have detected NukeBot, a new malware which has been designed to steal the credentials of online banking customers. Earlier versions of...

“Beware of BadRabbit” Sophos warns against new ransomware strain

Network and endpoint security leader Sophos has warned against a new ransomware strain known as BadRabbit targeting consumers and businesses. BadRabbit is among the strains of ransomware that users...

Simple ways to protect yourself from Phishing attacks

Phishing is a form of identity theft where cybercriminals try to obtain private details such as usernames, passwords, and credit card details, by masquerading...

Kaspersky Anti-Ransomware Tool available free of charge for businesses

Kaspersky Lab has launched Kaspersky Anti-Ransomware Tool for Business – a free software that offers complementary security to protect corporate users from ransomware. To...

The importance of securing Data Centres in the digital age.

Despite the advantages that emerging technologies bring organisations, decision-makers need to realise that data remains the key behind business success. Riaan Badenhorst, General Manager,...

Number of the Year 2016: One Billion Items of Malware Held in Kaspersky Lab’s...

Kaspersky Lab’s cloud malware database now carries a billion malicious objects, including viruses, Trojans, backdoors, ransomware, and advertisement applications and their components. A fifth...

ESET issues malware alert for Android phone users

Internet security company ESET East Africa has issued an alert to mobile phone users running on the Android platfom to be wary of alternative...

SamSam: The new ransomware that has raised ransom demands of almost $6 million

Network and endpoint security leader Sophos has uncovered a new ransomware which it claims has raised vastly more ransom demands of almost of $6...

Guest Post: Ransomware – Should you pay?

Ransomware, a form of extortion malware is often disguised as innocuous emails, links or pop-ups, thereby easily hoodwinking gullible users to grant access into their...

Is your network ready for GDPR and PoPI?

Over recent years, distributed denial of service (DDoS) attacks have become one of the biggest cyber-security headaches for CIOs and CSOs. Each year, these...

Kaspersky Lab Indicates Main Threat Vectors for Europe

Global cybersecurity company, Kaspersky Lab, held its annual European Cyber Security Weekend in Malta from 20 to 23 October. The event brought together company...

Opinion: Preparation is key when defending against DDoS attacks

By Bryan Hamman, Arbor Networks territory manager for Sub-Saharan Africa If you are well prepared with your security systems – deployed in a holistic manner...

Key Signs To Watch Out For To Know If You’re Being Scammed Online

These days pretty much everyone is on the internet, unfortunately, not everyone is a good person. Online scammers are prevalent all over the web,...

Sophos warns internet users against Petya Ransomware outbreak

Many any organizations in Europe and the US were last week crippled by yet another ransomware attack known as “Petya”. This is the second...

Sophos launches new solution to Combat Low Security Awareness Among End-Users

Sophos has today launched a new advanced phishing attack simulator and training solution to combat low-security awareness among end-users.  Known as Sophos Phish Threat, the...

Infographic: Understanding the WannaCry Ransomware

It is the name for a prolific hacking attack and known to be “Ransomware”, that holds your laptop surety till you pay a ransom....

Kaspersky Lab announces new business solution to empower SMBs

Kaspersky Lab announces a new Software-as-a-Service solution that will provide small and medium-sized businesses with multi-layered IT security. Known as Kaspersky Endpoint Security Cloud,...

Shippers get serious about Cyber Threat

Major attacks like the NotPetya malware incident have been a wake-up call for the shipping sector, creating a renewed urgency around tackling the threats...

One Cryptomalware attack cost Small Medium Businesses up to $99K in 2015

One cryptomalware attack cost small and medium businesses up to $99,000 on average last year, a global research, Corporate IT Security Risks 2016, conducted...
Kaspersky Lab

Kaspersky Lab launches Talent Lab, global cybersecurity competition

Kaspersky Lab has unveiled an international competition aimed at solving topical cybersecurity challenges.  The Talent Lab competition will see competitors use their technical and...

Sophos recognized as a Quadrant Leader of Gartner’s 2016

Security solutions provider Sophos has been positioned in the “Leaders” quadrant of Gartner, Inc.’s Aug. 30, 2016, "Magic Quadrant for Unified Threat Management.” This...

Sophos email system now available on its Cloud-Based Management Platform

Security solutions provider Sophos has today announced that Sophos Email is now available on its cloud-based Sophos Central management platform. This means customers and...

New Kaspersky Embedded Systems Security for ATMs and POS Terminals Closes Major Security and...

With the tactics of cybercriminals becoming ever more sophisticated, and with regulatory pressures also mounting, financial enterprises are up against increasing hurdles when it...

Personal Cyber Security:How To Protect Yourself From Cyber Criminals

The Importance of Online Security (Personal Cyber Security) Online security has never been more important both for business or individual persons. There are millions of...

Uiwix Ransomware Ain’t a New Version of WannaCry!

Chinese government authorities have warned against a new ransomware named "Uiwix", which is tested in the wild.  This new ransomware is lethal in its...

Ex-Manchester City Star Samir Nasri’s Twitter account hacked

  It’s not the first time we have told you about Twitter accounts of celebrities being hacked. Earlier in May, one of the most followed...

ESET East Africa receives Cyber Security Company Of The Year award

ESET East Africa has been voted the Cyber Security Company of the year at the 2018 Digital Inclusion Awards (DIA). ESET that specialises in the...

Government computers and networks were not affected during global WannaCry Ransom attack, Mucheru

Following the recent WannaCry Ransom attack that hit the world on Friday, May 14, the Ministry of Information and Technology has moved to reassure...

Sophos upgrades its Email Appliance to counter risk of cyber threats

Network and endpoint security firm Sophos has today announced that its has upgraded its email Appliance to counter cyber threats. With the upgrade, Sophos Email...

Cybersecurity: It’s time to ReThink Security Management

“You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete.” R. Buckminster Fuller...

IT Leadership: Preventing your network from becoming a Botnet

By Harish Chib, vice president, Middle East & Africa, Sophos Botnets are large volumes of distributed networked computers and devices that have been taken over by...

Google Removes Avast And AVG Extensions From Chrome Web Store

Google has kicked Avast and AVG browser extensions out of the Chrome Web store. The two were found guilty of uploading user data which...
As much as 70 percent of IoT devices comprise security flaws, which means devices that you own could get hacked by online criminals too.

Guest Post: Advanced cyber threats, demystified

A few years from now someone will start writing the history of advanced, highly sophisticated cyber threats. This person will obviously start with Stuxnet,...

CONNECT WITH US

5,156FansLike
1,238FollowersFollow
3,213FollowersFollow

24Bit Podcast Episode 19: Value vs Brand Name

What's in a name? Well, turns out, a lot. Quite a lot. Question, would you compromise on features of a product you want to buy...

EDITOR'S PICK

Shopify Joins Facebook-led Libra Association, Months After High Profile Members Exit

Facebook Libra has received the first new member, ever since the exit trend kicked off in the wake of regulatory scrutiny from the US. Shopify...

Here’s why you should offer health insurance to your employees

Today, the cost of healthcare in Kenya has risen drastically, thanks to the evergrowing demand for medical services. Having health insurance is therefore very...