CYBER SECURITY

Cyber security news updates and tips on why it is critical for an enterprise to utilize cybersecurity best practices to avoid common cyber security threats.

Cyber Security and The Impending Era of Connected Devices

By Jacob Haney One of the major problems that we see with the sudden boom in connected devices is that information security systems are not...
Fake mobile applications exposing Kenyans to cyber fraud, CA Report

Fake mobile applications exposing Kenyans to cyber fraud, CA Report

A proliferation of mobile applications on popular online stores is exposing Kenyans to increased cyber-attacks and fraud, the latest sector statistics report by the...

CA is warning of Emotet malware targeting local network systems

The Communications Authority of Kenya (CA), has warned of a new malware targeting network systems in the country. Known as ‘Emotet’, CA through the...

Don’t be a sitting duck against #IoT threats

As the Internet of Things (IoT) continues to gain traction, organizations will have to reassess their security practices to accommodate the increase in security...
Virus

Google, Xiaomi and Huawei Devices Fall Victim of a Zero-Day Flaw

Researchers from Googles' Elite bug hunting group, Project Zero, have reported the existence of a bug in Pixel, Xiaomi, and Huawei devices. The vulnerability was...

Sophos email system now available on its Cloud-Based Management Platform

Security solutions provider Sophos has today announced that Sophos Email is now available on its cloud-based Sophos Central management platform. This means customers and...

Report: WannaCry is still alive hitting almost 75,000 users in Q3 2018

One and a half years after its epidemic, WannaCry ransomware tops the list of the most widespread cryptor families and the ransomware has attacked...

Hackers break into Acer’s website, Compromises Credit Card Details of 34,500 Customers

In yet another massive security breach to be reported this year, data of of as many as 34,500 Acer products customer might have been compromised....

“Beware of BadRabbit” Sophos warns against new ransomware strain

Network and endpoint security leader Sophos has warned against a new ransomware strain known as BadRabbit targeting consumers and businesses. BadRabbit is among the strains of ransomware that users...

Telegram blames China for DDos attacks

Durov the founder and owner of secure messaging platform Telegram has reported the app has been hit by gazillions of "Garbage requests" that stopped...

Kaspersky Lab Warns of Cybersecurity for Industrial Facilities and Connected Devices in Smart Cities

Kaspersky Lab has warned of Cybersecurity for Industrial Facilities and Connected Devices in Smart Cities. This warning  was made during Kaspersky Lab’s annual Cyber Security...
NordVPN logo

NordVPN Announces Plans to Up its Security following Cyberattack

Following last week's reports on NordVPN, the company has announced plans to step up its security. The first move is a long-term strategic partnership...

How secure is your data, really?

More than 554 million data records were stolen during the first half of 2016, a 31% increase from the previous six months – and that...

Creditinfo new solution to combat synthetic identity fraud for Kenyan mobile lending market

Creditinfo has launched a new Integrated anti-fraud solution to combat identity fraud for the Kenyan mobile lending market. According to the credit information and risk...

[Column] Extending security to the cloud

Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances...
Kaspersky Lab has signed a memorandum of understanding (MoU) with the Smart Africa Alliance, to raise awareness on cybersecurity

Kaspersky Lab and Smart Africa sign MoU to raise awareness on cybersecurity in Africa

  Kaspersky Lab has signed a memorandum of understanding (MoU) with the Smart Africa Alliance, to raise awareness on cybersecurity. The MOU will also see...

Five steps to evaluating a DDoS managed service provider

The news that the Southern African Department of Labour was recently able to foil a distributed denial of service (DDoS) attack on one...
WhatsApp for Android

WhatsApp Flaw Could Allow Attackers to Alter Your Messages

Facebook's popular instant messaging app WhatsApp has yet another series of flaws that could let attackers alter your messages.  The flaws have been made...
Virus

Unpatched Android Bug Exploited To Steal Bank Logins

When it comes to security, the Android ecosystem is not safe. Android is the most vulnerable platform out there.  New research from a Norwegian...

Nigeria to host the 2020 Cyber Africa Summit

Global B2B events and conference organizer, Tradepass is set to host their exclusive cyber security conference, Cyber Africa Summit (CyFrica) 2020 in Nigeria. The...

Lack of education on ICT to blame for growing cyber attacks on Insurance and...

Insurance and banking services sectors in the country need to enhance the pace of deployment of secure Information Communication Technology (ICT) practices in their...
Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

Chinese hackers targeted big tech companies to steal trade secrets from enterprise customers

A cybersecurity firm has recently revealed information about Chinese hackers who have been hacking big telco companies intending to extract personal and corporate information...

New Multi-featured Mobile Trojan Loapi Discovered

Kaspersky Lab researchers have identified a new intriguing malware with multiple modules, which allows for an almost endless number of malicious features - from...

DDoS in the cloud: who’s watching your back?

Cloud computing is seeing a steady and undeniable  growth in adoption across all types of industries. Growing just as progressively, however, is the extent to...

Sophos launches ‘Xstream’ version of XG Firewall

Sophos has introduced a new “Xstream” architecture for Sophos XG Firewall with high performance Transport Layer Security (TLS) traffic decryption capabilities that eliminate significant...
DSLR camera

Your DSLR Camera is Also Vulnerable to Ransomware Attacks

Would you have ever imagined that cameras can be susceptible to attacks? I bet you’d think they are not. The fact that cameras do...

Twitter CEO Jack Dorsey’s Twitter account hit by hackers

No one is immune to to getting their social media accounts hacked. Last month we told how the most followed account on Twitter Katy...

Safaricom Introduces I.T Security Solutions For its Enterprise Customers

The services include Managed Security Solutions, Security Assurance and Advisory services as well as Managed Security Operations Center solutions and will enable the customers to access a wide range of security solutions to protect their information technology (I.T) systems.

ICT CS Joe Mucheru urges private sector to boost investment in cybersecurity

ICT Ministry Cabinet Sectretary Mr. Joe Mucheru, has urged the private sector to bolster investment in cybersecurity to curb the growing incidences of cybercrime...

SamSam: The new ransomware that has raised ransom demands of almost $6 million

Network and endpoint security leader Sophos has uncovered a new ransomware which it claims has raised vastly more ransom demands of almost of $6...
Mozilla Firefox

You Have To Update Your Firefox Browser Now

A zero-day attack has hit the Firefox browser. If you run either Firefox 67.0.3 and Firefox ESR 60.7.1 or maybe you’re not sure on...

Sophos warns internet users against Petya Ransomware outbreak

Many any organizations in Europe and the US were last week crippled by yet another ransomware attack known as “Petya”. This is the second...

Businesses at risk due to unidentified network traffic according Sophos Global Survey

IT managers from mid-sized businesses cannot identify 45 percent of their organization’s network traffic.  In fact, nearly one-in-four cannot identify 70 percent of this...

ESET issues malware alert for Android phone users

Internet security company ESET East Africa has issued an alert to mobile phone users running on the Android platfom to be wary of alternative...

Delete ToTok From Your Device, Its Reportedly An Emirati Spy Tool

Popular Chat app ToTok is reportedly a spy tool deployed by the United Arab Emirates government. The chat app, according to a report from the...

Sophos upgrades its Cloud Optix to simplify cloud security

Endpoint security leader Sophos has unveiled advancements to its Cloud Optix that automate and simplify the detection and response of cloud security vulnerabilities and...
phone spy

Android Stalking Apps Use Cases Has Risen By a Staggering 373 Percent in 2019

Stalker apps on Android is not a new thing. These apps let individuals spy on other users’ messages, call information, and GPS locations –...

Remove these VPN apps from your Android phone immediately

By now, you are pretty much familiar with the pattern. Google keeps fighting malicious actors on the Playstore, but still, the platform remains a...
Apple's Logo Background reflection

iMessage has a Mysterious Security Bug That Apple Is Yet to Patch

Two Google Project Zero bug hunters (Silvanovich and Samuel Groß) have revealed details on an iOS security flaw that could be capitalized on via...
Sophos Intercept X

Sophos launches Intercept X for Server with EDR to help businesses battle new blended...

EndPoint security leader Sophos has today announced that it is launching Intercept X for Server with Endpoint Detection and Response (EDR) to help businesses...

The war on cybercrime – why all Kenyan organisations need to play their part

By Brian Pinnock, Mimecast Africa and the Middle East Cyberattacks in Kenya are on the rise. There’s barely a day that goes by where you...
One of the most valuable assets you have as a business owner is your server, and IT security issues like a data breach is a huge business nightmare.

Guest Post: 7 Ways to Protect Your IT Infrastructure from a Data Breach

Succumbing to cyber attacks can hurt your brand image. Fortunately, there are many techniques to infiltrate your systems such as having an IT security...
Facebook App Login page

Facebook Promises To Improve User Data Security After Several Breaches

Facebook has promised that they will improve their security protocol to ensure user data is safe, after several breaches. The company's pledge recently surfaced...
Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

More than 40% of ICS computers were attacked in H1 2018

More than 40% of all industrial control system (ICS) computers protected by Kaspersky Lab solutions were attacked by malicious software at least once during...
Google chrome

Google Chrome To Start Blocking Insecure Downloads Soon

At times, we assume the small but very critical warnings shown by browsers. Warnings about visiting sites with no secure protocols, to downloading files...

ESET Releases 2018 Report: Predicts Trends in Cybersecurity

Global cybersecurity services leader ESET has warned that the ransomware menace is likely to continue into 2018 with further growth in incidents and risks...
As much as 70 percent of IoT devices comprise security flaws, which means devices that you own could get hacked by online criminals too.

NukeBot trojan threatens to steal details of customer online banking transactions

Kaspersky Lab researchers have detected NukeBot, a new malware which has been designed to steal the credentials of online banking customers. Earlier versions of...

Sophos Server Protection products now optimized with CryptoGuard Technology

IT security firm Sophos has announced that its next-generation anti-ransomware 'CryptoGuard' technology is now available with its ‘Sophos Server Protection’ products. With this optimization,...
As much as 70 percent of IoT devices comprise security flaws, which means devices that you own could get hacked by online criminals too.

Guest Post: Advanced cyber threats, demystified

A few years from now someone will start writing the history of advanced, highly sophisticated cyber threats. This person will obviously start with Stuxnet,...

[Column] Beware: Gender-based cybercrime

Recent South African news reports have reflected an influx of gender-based crimes targeting women. Heartbreaking and harrowing accounts have flooded the media depicting these...

New Kaspersky Embedded Systems Security for ATMs and POS Terminals Closes Major Security and...

With the tactics of cybercriminals becoming ever more sophisticated, and with regulatory pressures also mounting, financial enterprises are up against increasing hurdles when it...
airpods-bluetooth-device-phone-accessories

Bluetooth has a Serious Flaw that Exposes Millions of Devices Vulnerable to Attacks

Cybersecurity researchers have detailed a report that showcases a flaw in Bluetooth dubbed KNOB (Key Negotiation Of Bluetooth). KNOB allows an attacker to break the...

Female Journalists in Kenya to be trained on online safety

With more users now spending time online, the ways they can get compromised on the internet have gotten more numerous and sophisticated. From phishing...

Matrix Deconstructed: The trend for targeted ransomware continues

Endpoint security leader Sophos has released a new report  about a new ransomware family called Matrix. The malware has been operating since 2016 and Sophos...
Sophos Intercept X

Sophos Intercept X Achieves Highest Security Effectiveness Score in NSS Labs 2019 Advanced Endpoint...

Sophos announced that its next-gen endpoint solution, Sophos Intercept X, was recognized for having the highest security effectiveness and the most efficient TCO (total cost...
Sophos Intercept X installs alongside existing endpoint security software from any vendor, immediately boosting endpoint protection by stopping malicious code before it executes.

Sophos unveils Sophos Intercept X to extend its Next-Generation Endpoint Security Capabilities

Sophos has announced has unveiled its next-generation endpoint security product that stops zero-day malware, unknown exploit variants and stealth attacks. Known as Sophos Intercept...

How to defend your business from insider threat

Insider threats are like tumors in a person’s body. Fortunately for stakeholders, insider threat does not involve uncontrollable factors and can be prevented before...

Remove These 17 Apps From Your Android Phone ASAP!

You might be used to this kind of news already if you frequent our space. Last year no tangible progress was made in terms...

More collaborative efforts required to fight mobile money fraud and cyber crime, says DPP

The Director of Public Prosecution Noordin Haji has called on all stakeholders in financial institutions and banking sector to work together to strengthen the fight against mobile...
[Column] Data Security; embracing autonomy and intelligent machines

[Column] Data Security; embracing autonomy and intelligent machines

By Christine Ambetsa, Regional Applications Sales Leader - East Africa at Oracle CIOs are operating in a state of heightened awareness. Their mission-critical systems are...

The importance of securing Data Centres in the digital age.

Despite the advantages that emerging technologies bring organisations, decision-makers need to realise that data remains the key behind business success. Riaan Badenhorst, General Manager,...
WhatsApp logo

WhatsApp Glitch Could Allow Hackers To Steal Your Media Files Using GIFs

It is again high time that you should consider updating your WhatsApp. According to a report published by a security researcher, a bug on...

Clues are Dead – Kaspersky Lab’s Threat Predictions 2017

Kaspersky Lab’s discovery in 2016 of an APT-able to create new tools for each victim has effectively killed off ‘Indicators of Compromise’ as a...

Key Signs To Watch Out For To Know If You’re Being Scammed Online

These days pretty much everyone is on the internet, unfortunately, not everyone is a good person. Online scammers are prevalent all over the web,...

Sophos warns of more SamSam ransomware copycat attacks in 2019

Instead of using mass spamming techniques to blast malware to millions of recipients in the hope of collecting thousands of dollars each from thousands...

Opinion: Taking enterprise security to the board

It’s that time of year, again, with many companies busying themselves in the art of budgeting and forecasting for 2018. In some companies, this means...

Nokia malware report reveals new all-time high in mobile device infections and major IoT...

The latest Threat Intelligence Report by Nokia has revealed a new all-time high in mobile device malware infections, a sharp increase in compromised smartphones and...

One Cryptomalware attack cost Small Medium Businesses up to $99K in 2015

One cryptomalware attack cost small and medium businesses up to $99,000 on average last year, a global research, Corporate IT Security Risks 2016, conducted...
Kaspersky Lab

Kaspersky Lab is setting up a new office in Kigali

Kaspersky Lab is opening a new office in Kigali, Rwanda. The cybersecurity and antivirus provider has announced plans to set up the new office...
Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

Cybercriminals attacked one of the cloud server honeypots within 52 seconds of the honeypot going live in Sao Paulo, Brazil. This is according to...

Banks expenditure on IT Security is 3x Higher than Non-Financial Organisations

Financial institutions are under pressure to ramp up security, with trends such as the increased take-up of mobile banking putting banks’ IT infrastructure defenses...
Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

SMEs Should Partner with Cyber Security Specialists to Prevent Loss of Billions

Imagine waking up one beautiful Monday only to realize that your website has been hacked. Your online accounts, your most precious work and even...
Google chrome

Google Deletes Hundreds Of Chrome Extensions Involved In Malvertising

Google has axed a slew of Chrome browser extensions that were part of a malicious advertising network. The malicious extensions were uncovered by an...

Sophos Announces Unified Security and Control solution for Mobile Devices, Laptops and IoT devices

  Sophos has today announced its the latest version of its Enterprise Mobility Management (EMM) solution. Known as Sophos Mobile 7, this new version extends containerization...

Someone is buying a malware-loaded laptop for $1.345 million

If you thought the world is crazy-it’s not but people are. Last week a laptop loaded with malware for auctioned at an asking price...
google 2FA challenge

Google: 2FA blocks 100% of automated bot attacks

Think 2FA is a joke? This post is for you. The new research done by Google is something you should know. Google earlier this year...

Opinion: Of banks and cybersecurity

If there’s one industry we should be most concerned about when it comes to cyber criminals and security, it’s the one that looks...

Kaspersky Lab announces new business solution to empower SMBs

Kaspersky Lab announces a new Software-as-a-Service solution that will provide small and medium-sized businesses with multi-layered IT security. Known as Kaspersky Endpoint Security Cloud,...

$4.4 Billion has been lost this year to cryptocurrency crimes, Report

2019 seems to be a good year for cryptocurrency criminals. According to a report from CipherTrace, victims have lost $4.4 Billion in cryptocurrency in...

National Bank of Kenya loses Ksh.29 Million to hackers.

The National Bank of Kenya has lost about Ksh.29 million to hackers. The hacking incident is said to have happened on Wednesday 17th. “We...

Android Security: Mobiles Phones Spying is it Legal or not?

Smart phone is an individual’s property and it contains most personal and private data of a person. Every person has legal right to secure...

Here Is Why You Should Update Your Twitter Android App Immediately

Twitter recently stated that it's Android app had a vulnerability that could allow malicious actors to view private user information. Through this vulnerability, hackers could...

Kenyan companies accruing massive losses amidst rising cyberattacks

Banks have become the leading target of cybercrime as people increasingly adopt the use of financial technology. In fact, according to Serianu’s Cybersecurity Report...

SIM swap fraud is now global threat, says Myriad Connect

SIM swap fraud has plagued mobile users across Africa for years, with Myriad Connect’s recent survey in Kenya revealing that over 90% of Kenyan...

Is your network ready for GDPR and PoPI?

Over recent years, distributed denial of service (DDoS) attacks have become one of the biggest cyber-security headaches for CIOs and CSOs. Each year, these...

Global Wannacry Ransomware Attack – Infographic

Ransomware WannaCrypt makes you cry? Struggling to survive from this large-scale cyber attack? This inforgraphic below lets you understand the history of WannaCrypt virus...

Avoid These 100 Malicious Apps Listed On Google Play

New Android malware has been spotted online and has infected over 100 apps available on the Google Play Store. This is according to a...

Sophos’ Intercept X secures Android and iOS mobile users from fleeceware applications

Sophos introduced Sophos Intercept X for Mobile with new security capabilities for Chrome OS devices and improved mobile threat defense for Android and iOS devices. The company...

Simple ways to protect yourself from Phishing attacks

Phishing is a form of identity theft where cybercriminals try to obtain private details such as usernames, passwords, and credit card details, by masquerading...
Truecaller

Truecaller user data selling on the dark web for over KES 200,000

TrueCaller Indian user data has been seen selling on the dark web for over KES 200,000. The data, according to a report is that...

‘Collection #1’ data breach leaks more than 700M email addresses

In what has been described as one of the largest data breach in history, the Troy Hunt owned Have I Been Pwned? (HIBP) website...

Liquid Telecom report highlights cybersecurity concerns for African businesses

Liquid Telecom has released new Cybersecurity & Data Protection Report identifying the latest cyber security and data protection concerns and challenges facing African businesses....

Safaricom ups the game against fraud

Safaricom has today unveiled its new plans for tackling fraud activities on its platforms. Kenya’s largest telco reported that through the implementation of their...

Developers to make API calls with SophosLabs Intelix, a Cloud-Based Threat Intelligence Platform

SophosLabs Intelix, a cloud-based threat intelligence and analysis platform enables developers to build more secure applications. Developers will be able to make API calls...

Kaspersky Lab Indicates Main Threat Vectors for Europe

Global cybersecurity company, Kaspersky Lab, held its annual European Cyber Security Weekend in Malta from 20 to 23 October. The event brought together company...

Report Claims China Installs Malware on Tourists’ Phones At The Border

Amid the stalled China-US trade wars that leveraged Huawei as the click bait, reports indicate the Chinese government has been forcing foreigners to download...

Guest Post: Ransomware – Should you pay?

Ransomware, a form of extortion malware is often disguised as innocuous emails, links or pop-ups, thereby easily hoodwinking gullible users to grant access into their...

ESET supports call for standardized cybersecurity breach reporting

Internet security company ESET East Africa has added its voice to the call for legislation to compel organizations to share or release information to...

Why You Should Upgrade to iOS 12.4.1 ASAP!

If there is a company that has been working hard to keep its mobile OS out of trouble with hackers is Apple. The company...

Sophos expands its partner program to enables partners to secure Cloud platforms

Sophos is expanding its Partner Program for its channel partners to now training, certification and financial incentives that will help them support customers using...

Personal Cyber Security:How To Protect Yourself From Cyber Criminals

The Importance of Online Security (Personal Cyber Security) Online security has never been more important both for business or individual persons. There are millions of...

CONNECT WITH US

5,156FansLike
1,238FollowersFollow
3,213FollowersFollow

24Bit Podcast Episode 19: Value vs Brand Name

What's in a name? Well, turns out, a lot. Quite a lot. Question, would you compromise on features of a product you want to buy...

EDITOR'S PICK

Shopify Joins Facebook-led Libra Association, Months After High Profile Members Exit

Facebook Libra has received the first new member, ever since the exit trend kicked off in the wake of regulatory scrutiny from the US. Shopify...

Here’s why you should offer health insurance to your employees

Today, the cost of healthcare in Kenya has risen drastically, thanks to the evergrowing demand for medical services. Having health insurance is therefore very...