CYBER SECURITY

Cyber security news updates and tips on why it is critical for an enterprise to utilize cybersecurity best practices to avoid common cyber security threats.

Report: WannaCry is still alive hitting almost 75,000 users in Q3 2018

One and a half years after its epidemic, WannaCry ransomware tops the list of the most widespread cryptor families and the ransomware has attacked...

3 ways you can keep yourself and your devices protected

Connecting to the Internet today has become a norm for most of us, as we enjoy the convenience of public Wi-Fi, using smartphones to...

ESET announces free online cybersecurity training for businesses in Kenya

Internet security company ESET East Africa has announced the availability of free cybersecurity training for businesses and their employees in Kenya. The ESET Cybersecurity Awareness...

5 Security Tips To Protect Your Website From Hackers

Most websites right now are using online marketing, and many people claim hackers can’t affect their site. That’s when you lower your guard, and...

How to defend your business from insider threat

Insider threats are like tumors in a person’s body. Fortunately for stakeholders, insider threat does not involve uncontrollable factors and can be prevented before...

ESET supports call for standardized cybersecurity breach reporting

Internet security company ESET East Africa has added its voice to the call for legislation to compel organizations to share or release information to...
Mozilla Firefox Logo

FireFox Latest Update Strengthens its Password Manager for Improved Privacy and Security

Mozilla has launched a new version of its Firefox browser – Firefox 76. In the latest update, Mozilla has focused primarily on beefing up...
Google chrome

Google Chrome To Start Blocking Insecure Downloads Soon

At times, we assume the small but very critical warnings shown by browsers. Warnings about visiting sites with no secure protocols, to downloading files...
Google Two-Factor Authentication-promt

Google Switches To Phone Notifications As Default Two-Factor Authentication Method

Two-factor authentication is a great way of securing your online accounts. Its use has grown immensely in the past few years as many people...
As much as 70 percent of IoT devices comprise security flaws, which means devices that you own could get hacked by online criminals too.

Guest Post: Do You Own One of the Most Hackable Devices?

An IT solutions company in the Philippines, as well as other cybersecurity firms, have stressed that everything connected to the Internet is hackable. From...
Sophos Intercept X

Sophos unveils an updated version of its EDR solution

Sophos today unveiled an updated version of its Endpoint Detection and Response (EDR), the first solution designed for both security analysts and IT administrators. This...

Sophos’ Intercept X secures Android and iOS mobile users from fleeceware applications

Sophos introduced Sophos Intercept X for Mobile with new security capabilities for Chrome OS devices and improved mobile threat defense for Android and iOS devices. The company...
Sophos Intercept X

Sopho adds Lateral Movement Protection to XG Firewall to prevents threats from spreading

Sophos has now included lateral movement protection to prevent targeted, manual cyberattacks or exploits from infiltrating further into a compromised network. According to the SophosLabs...

Remove these VPN apps from your Android phone immediately

By now, you are pretty much familiar with the pattern. Google keeps fighting malicious actors on the Playstore, but still, the platform remains a...

Lack of education on ICT to blame for growing cyber attacks on Insurance and...

Insurance and banking services sectors in the country need to enhance the pace of deployment of secure Information Communication Technology (ICT) practices in their...
Sophos Intercept X

Sophos 2020 Threat Report: Cyber criminals are exploiting malicious Android apps, misconfigured cloud platforms...

Sophos 2020 Threat Report shows how cyber attackers are raising the stakes in ransomware, increasing stealth in malicious Android apps, exploiting misconfiguration in the...
Sophos Intercept X installs alongside existing endpoint security software from any vendor, immediately boosting endpoint protection by stopping malicious code before it executes.

Sophos unveils Sophos Intercept X to extend its Next-Generation Endpoint Security Capabilities

Sophos has announced has unveiled its next-generation endpoint security product that stops zero-day malware, unknown exploit variants and stealth attacks. Known as Sophos Intercept...

Sophos launches new solution to Combat Low Security Awareness Among End-Users

Sophos has today launched a new advanced phishing attack simulator and training solution to combat low-security awareness among end-users.  Known as Sophos Phish Threat, the...
Zoom Room

Zoom is Bringing The Real End-to-End Encryption This Time, But There’s a Catch

Zoom is finally taking the big leap to bring an end to end encryption (E2EE) as it continues its 90-day challenge to beef up...

DDoS in the cloud: who’s watching your back?

Cloud computing is seeing a steady and undeniable  growth in adoption across all types of industries. Growing just as progressively, however, is the extent to...
Facebook CEO Mark Zuckerberg

Facebook Continued to Share User Data With Developers Longer Than Promised

Facebook has come clean, saying they shared user data with third-party developers longer than they had promised. The US Social media giant found itself...

Sophos expands its partner program to enables partners to secure Cloud platforms

Sophos is expanding its Partner Program for its channel partners to now training, certification and financial incentives that will help them support customers using...

Key Signs To Watch Out For To Know If You’re Being Scammed Online

These days pretty much everyone is on the internet, unfortunately, not everyone is a good person. Online scammers are prevalent all over the web,...

National Bank of Kenya loses Ksh.29 Million to hackers.

The National Bank of Kenya has lost about Ksh.29 million to hackers. The hacking incident is said to have happened on Wednesday 17th. “We...
iPhone X

New Exploit could allow permanent jailbreaking of millions of iPhone devices

Towards the end of last month, Google’s elite bug-hunting team – Project Zero – released a report on malicious website hijacking the iPhone. But...

User lock-down or education? Just one of today’s cybersecurity issues in a rapidly evolving...

According to the recent PwC report, The Global State of Information Security Survey 2018, companies around the globe are becoming more reliant on cyber...
Android logo

Bluetooth Security Flaw Paves Way For Hackers To Deliver Malware To Millions Of Android...

Android smartphones have allegedly a Bluetooth security flaw that can be exploited to deliver malicious files. Security researchers at ERNW, discovered the Bluetooth flaw,...

‘Excellent Job, Thanks’: You May Never Know about the Cybersecurity Incidents Caused by Your...

Employees hide IT security incidents in 40% of businesses around the world, that’s according to a new report from Kaspersky Lab and B2B International,...
Microsoft logo

250 Million Microsoft Customer Service And Support Records Exposed Online

Microsoft was involved in a data breach with millions of customer service and support records exposed. The report was revealed by the Comparitech security research...

Zcash Fever: Criminals Exploiting Users PCs to Make Profits Mining Cryptocurrency

At the end of October, the new cryptocurrency Zcash was launched. It is positioned by its creators as a more secure alternative to Bitcoin....

SamSam: The new ransomware that has raised ransom demands of almost $6 million

Network and endpoint security leader Sophos has uncovered a new ransomware which it claims has raised vastly more ransom demands of almost of $6...

Kaspersky Lab Indicates Main Threat Vectors for Europe

Global cybersecurity company, Kaspersky Lab, held its annual European Cyber Security Weekend in Malta from 20 to 23 October. The event brought together company...

CA is warning of Emotet malware targeting local network systems

The Communications Authority of Kenya (CA), has warned of a new malware targeting network systems in the country. Known as ‘Emotet’, CA through the...

Female Journalists in Kenya to be trained on online safety

With more users now spending time online, the ways they can get compromised on the internet have gotten more numerous and sophisticated. From phishing...

Hackers break into Acer’s website, Compromises Credit Card Details of 34,500 Customers

In yet another massive security breach to be reported this year, data of of as many as 34,500 Acer products customer might have been compromised....

More collaborative efforts required to fight mobile money fraud and cyber crime, says DPP

The Director of Public Prosecution Noordin Haji has called on all stakeholders in financial institutions and banking sector to work together to strengthen the fight against mobile...
Facebook App Login page

Facebook Promises To Improve User Data Security After Several Breaches

Facebook has promised that they will improve their security protocol to ensure user data is safe, after several breaches. The company's pledge recently surfaced...
WhatsApp app

WhatsApp bug could allow hackers exploit devices using MP4 files

A unique bug on WhatsApp revealed by the company could let attackers exploit your device using MP4 files. The bug, which was identified as...
Truecaller

Truecaller user data selling on the dark web for over KES 200,000

TrueCaller Indian user data has been seen selling on the dark web for over KES 200,000. The data, according to a report is that...

Sextortion Money Trail Leads to Underbelly of Cybercriminal Activity, SophosLabs Report

Sophos has published a SophosLabs article, Following the Money in a Massive “Sextortion” Spam Scheme, that shows how the funds extracted from victims led...
As much as 70 percent of IoT devices comprise security flaws, which means devices that you own could get hacked by online criminals too.

Guest Post: Advanced cyber threats, demystified

A few years from now someone will start writing the history of advanced, highly sophisticated cyber threats. This person will obviously start with Stuxnet,...
Sophos Intercept X

Sophos introduces Sophos Intercept X for Server To Protect Businesses Against Cyber Threats

Sophos has today announced Sophos Intercept X for Server, its next-generation server protection with predictive deep learning technology that provides constantly evolving security against...

The annual CIO East Africa Security Summit kicks off in Nairobi

CIO East Africa in conjunction with the International Data Group (IDG), yesterday held its second annual Africa Security Summit at the Norfolk Hotel, Nairobi....
Telegram logo

Russia Lifts Ban on Private Messaging App Telegram

Finally, Russia is lifting its ban on Telegram, the popular private messaging app developed by Russian-born developer, Parel Durov. The announcement came from the Russian...

Shippers get serious about Cyber Threat

Major attacks like the NotPetya malware incident have been a wake-up call for the shipping sector, creating a renewed urgency around tackling the threats...

5 Ways to Secure Your Identity in the Data Breach Era

By Patrick Rono, Security Technical Professional- IBM East Africa With major cybersecurity incidents dominating headlines for the past several years, consumers are well aware of...

Porn on the move: In 2017, over 25% of users hit by mobile malware...

In 2017, 25.4% of mobile users who encountered malware - over 1.2 million people - were attacked by malicious programs that used adult content...
The R&D center will be focused on developing data analysis and machine learning technologies for the company’s enterprise solutions offering. Photo Source: Kaspersky Lab Blog

Kaspersky Lab opens its first Research and Development office in Europe

Kaspersky Lab has announced the opening of its first European research and development (R&D) center, in Dublin, Ireland. The company initial investment into the...

Avoid These 100 Malicious Apps Listed On Google Play

New Android malware has been spotted online and has infected over 100 apps available on the Google Play Store. This is according to a...

Google is partnering with security companies to crack down on malicious apps before they...

Android is messed up, not entirely, but there is a never-ending threat to malicious apps being harbored in the official store. While it is not...
Apple Logo

NSO Group’s Malware Now Capable of Spying on Data Stored in iCloud, Reports

The NSO Group, a famous Israel security firm has reportedly developed tools which can be able to scrape data from cloud services. This could...
Google Chrome logo

Google Plans To Remove Spammy Add-ons from Chrome’s Web Store

Google is taking matters in its hands by retiring spammy chrome add-ons available on the web-store. Since its inception in 2011, Chrome's Webstore has...
Google

Just Googling these Celebrities might get you Hacked

Many people love celeb gossip, and that has also turned out as a sweet spot for hackers to prey on unsuspecting users. As it...
iOS 13

Apple Patches an iOS 13 Vulnerability that Allowed iPhone ‘Jailbreaking’

Just last week,  the unc0ver team discovered an iOS 13.5 vulnerability that allowed anyone to jailbreak an iPhone or iPad. The company yesterday released...

Why You Should Upgrade to iOS 12.4.1 ASAP!

If there is a company that has been working hard to keep its mobile OS out of trouble with hackers is Apple. The company...

Nigeria to host the 2020 Cyber Africa Summit

Global B2B events and conference organizer, Tradepass is set to host their exclusive cyber security conference, Cyber Africa Summit (CyFrica) 2020 in Nigeria. The...

Something Phishy: How to Identify and Avoid Phishing Scams

By Harish Chib, VP MEA Sophos. Phishing is one of the most common attack vectors for hackers who exploit end-user behavior as the weakest link in...
Zoom app free

Zoom changes mind, says it will provide end-to-end encryption to free users

Zoom has quickly changed its hard stance against its upcoming end-to-end encryption technology. After being pressured on security and privacy grounds, the company announced...

Here Is Why You Should Update Your Twitter Android App Immediately

Twitter recently stated that it's Android app had a vulnerability that could allow malicious actors to view private user information. Through this vulnerability, hackers could...
airpods-bluetooth-device-phone-accessories

Bluetooth has a Serious Flaw that Exposes Millions of Devices Vulnerable to Attacks

Cybersecurity researchers have detailed a report that showcases a flaw in Bluetooth dubbed KNOB (Key Negotiation Of Bluetooth). KNOB allows an attacker to break the...

Opinion: Cloud computing evolves, becomes enterprise cloud-as-a-service

Over the past two decades or so, the concept of cloud computing has evolved dramatically, as new data centre and networking technologies came to...

Sophos Cloud Optix to provide cloud security vulnerabilities to Amazon Web Services Customers

Sophos today announced the availability of Sophos Cloud Optix on Amazon Web Services (AWS) Marketplace. As a new agentless software-as-a-service (SaaS) offering, Cloud Optix automatically discovers...

$4.4 Billion has been lost this year to cryptocurrency crimes, Report

2019 seems to be a good year for cryptocurrency criminals. According to a report from CipherTrace, victims have lost $4.4 Billion in cryptocurrency in...
Kaspersky Lab has signed a memorandum of understanding (MoU) with the Smart Africa Alliance, to raise awareness on cybersecurity

Kaspersky Lab and Smart Africa sign MoU to raise awareness on cybersecurity in Africa

  Kaspersky Lab has signed a memorandum of understanding (MoU) with the Smart Africa Alliance, to raise awareness on cybersecurity. The MOU will also see...

Banks expenditure on IT Security is 3x Higher than Non-Financial Organisations

Financial institutions are under pressure to ramp up security, with trends such as the increased take-up of mobile banking putting banks’ IT infrastructure defenses...
Paul Ducklin, principal research scientist, Sophos

[Column] Time to rethink your approach towards password change

Until a few years ago, everyone received advice to change passwords on a regular and frequent basis, just because it was possible. But the...
Apple back iPhone

iPhones have been Quietly Hacked by Malicious Websites for Years, says Google

In what appears to be one of the deadliest attacks ever to grace the iOS land, Google has revealed a report stating hacked websites...
Sophos Intercept X

Sophos Intercept X Achieves Highest Security Effectiveness Score in NSS Labs 2019 Advanced Endpoint...

Sophos announced that its next-gen endpoint solution, Sophos Intercept X, was recognized for having the highest security effectiveness and the most efficient TCO (total cost...

How secure is your data, really?

More than 554 million data records were stolen during the first half of 2016, a 31% increase from the previous six months – and that...
Facebook CEO Mark Zuckeerberg

Facebook Confirms Millions of users’ Phone Numbers have been Exposed Online

Facebook has confirmed the news reports that millions of phone numbers linked with Facebook user accounts have been exposed. The company confirmed to an...
WhatsApp for Android

WhatsApp Flaw Could Allow Attackers to Alter Your Messages

Facebook's popular instant messaging app WhatsApp has yet another series of flaws that could let attackers alter your messages.  The flaws have been made...

3 differences between Petya and WannaCry Ransomware

How the cyberattacks differ and what it means for ransomware security The world has recently come under attack from not one but two separate globe-trotting...

Uiwix Ransomware Ain’t a New Version of WannaCry!

Chinese government authorities have warned against a new ransomware named "Uiwix", which is tested in the wild.  This new ransomware is lethal in its...

ICT CS Joe Mucheru urges private sector to boost investment in cybersecurity

ICT Ministry Cabinet Sectretary Mr. Joe Mucheru, has urged the private sector to bolster investment in cybersecurity to curb the growing incidences of cybercrime...

Paying Ransom Doubles Ransomware Attack Recovery Cost, Says Sophos

Many organisations have always considered paying cyber ransom whenever they are hit by a ransomware attack. Doing so might however not be a good...

Xiaomi Accused Of Collecting Browsing Data From Their Web Browsers

A recent shocking report from Forbes’s cybersecurity contributor and associate editor, Thomas Brewster, reveals that Xiaomi browsers are sending browsing data to Xiaomi-rented remote...

Sophos warns of more SamSam ransomware copycat attacks in 2019

Instead of using mass spamming techniques to blast malware to millions of recipients in the hope of collecting thousands of dollars each from thousands...
Virus

Google, Xiaomi and Huawei Devices Fall Victim of a Zero-Day Flaw

Researchers from Googles' Elite bug hunting group, Project Zero, have reported the existence of a bug in Pixel, Xiaomi, and Huawei devices. The vulnerability was...

Sophos upgrades its Email Appliance to counter risk of cyber threats

Network and endpoint security firm Sophos has today announced that its has upgraded its email Appliance to counter cyber threats. With the upgrade, Sophos Email...
NordVPN logo

NordVPN Announces Plans to Up its Security following Cyberattack

Following last week's reports on NordVPN, the company has announced plans to step up its security. The first move is a long-term strategic partnership...

Clues are Dead – Kaspersky Lab’s Threat Predictions 2017

Kaspersky Lab’s discovery in 2016 of an APT-able to create new tools for each victim has effectively killed off ‘Indicators of Compromise’ as a...

Google Report Reveals Users Stick to Passwords that have Already been Hacked

In this digital era, secure passwords are vital in protecting your personal information, not entirely, but at least you did your part. At times...
facebook

Facebook stored up to 600 million user passwords in plain text

By now you have probably heard of the scary news of how Facebook stored millions of user’s passwords in plain text. The news was...
Google for Startups Accelerator Africa

Google stored plaintext passwords for a subset of G-Suite users since 2005

To say that our online data is secure on any website on the internet is a mere hoax. However, companies have at least developed...

Sophos Reports discovers 30 Fleeceware Apps Targeting iPhone users

Sophos has published a new report showing how Apple device users are being targeted by applications that overcharge users through costly subscriptions or unscrupulous...

ESET signs M.O.U with @iLabAfrica centre to fight cybercrime in Kenya

Internet security company ESET East Africa has signed a memorandum of understanding (M.O.U) with Strathmore’s @iLabAfrica aimed at enhancing the fight against cybercrime in...
man using smartphone

Remove These VPN And Ad Blocking Apps That Are Spying On Your Device

Understanding the basis of how app store analytics platforms, for instance, App Annie and Sensor Tower, sparks anxiety. These platforms try to get an...

Sophos Announces Unified Security and Control solution for Mobile Devices, Laptops and IoT devices

  Sophos has today announced its the latest version of its Enterprise Mobility Management (EMM) solution. Known as Sophos Mobile 7, this new version extends containerization...

Sophos 2019 Threat Report unveils the rise of the hand-delivered, targeted

Sophos has launched its 2019 Threat Report providing insights into emerging and evolving cybersecurity trends. The report, produced by SophosLabs researchers, explores changes in the threat landscape...
NordVPN logo

Popular VPN Service NordVPN Was Hacked

NordVPN one of the popular VPN services that promotes itself as a tool for protecting your online privacy says it was hacked. The company...

Report Claims China Installs Malware on Tourists’ Phones At The Border

Amid the stalled China-US trade wars that leveraged Huawei as the click bait, reports indicate the Chinese government has been forcing foreigners to download...
Sophos Intercept X

Sophos Central Management Platform Now Features All Next-Gen Cybersecurity Protection from Sophos

Addition of Sophos XG Firewall provides advanced Synchronized Security capabilities for accelerated response to cyberattacks from a single cloud-based management console

Twitter CEO Jack Dorsey’s Twitter account hit by hackers

No one is immune to to getting their social media accounts hacked. Last month we told how the most followed account on Twitter Katy...

Creditinfo new solution to combat synthetic identity fraud for Kenyan mobile lending market

Creditinfo has launched a new Integrated anti-fraud solution to combat identity fraud for the Kenyan mobile lending market. According to the credit information and risk...

MTN unveils Managed Security as a service solution for Kenyan enterprises

MTN Business has today launched MTN Managed Security as a service solution for its enterprise customers in Kenya. The product, according to MTN aims...
Google chrome

Google Issues Chrome Update to Patch This Serious Security Flaw

If you're a regular user of Google's Chrome independent of the desktop platform, it is high time that you should be updating your browser....
Mozilla Firefox

You Have To Update Your Firefox Browser Now

A zero-day attack has hit the Firefox browser. If you run either Firefox 67.0.3 and Firefox ESR 60.7.1 or maybe you’re not sure on...
As much as 70 percent of IoT devices comprise security flaws, which means devices that you own could get hacked by online criminals too.

NukeBot trojan threatens to steal details of customer online banking transactions

Kaspersky Lab researchers have detected NukeBot, a new malware which has been designed to steal the credentials of online banking customers. Earlier versions of...

Sophos acquired for $3.9 billion in cash

Cybersecurity company Sophos has announced earlier today that it has been acquired. The firm was acquired by Thoma Bravo, a private equity firm in...
Android virus

Remove These 17 Apps From Your Android Phone ASAP!

You might be used to this kind of news already if you frequent our space. Last year no tangible progress was made in terms...
Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds of going live, Sophos Report

Cybercriminals attacked one of the cloud server honeypots within 52 seconds of the honeypot going live in Sao Paulo, Brazil. This is according to...

CONNECT WITH US

5,406FansLike
1,253FollowersFollow
3,338FollowersFollow

TRENDING

Ngao Credit: How SMEs can benefit from Our Jijenge loan product

The coronavirus pandemic is hitting the global economy hard. While it is hard to exactly tell the extent the damage the virus will have...

24Bit Podcast Episode 23: Are Kenyans Ready for Cashless Matatu Payments?

In this latest episode of our 24Bit podcast, Emmanuel Chenze, Nick Kanali and Dickson Otieno discuss the new upcoming requirement by the NTSA to...

EDITOR'S PICK