ESET East Africa has set up a free online training for businesses in Kenya in a move to Educate employees while enabling firms to curb the impact of cyber attacks and data breaches that are becoming more severe to business operations around the world. A recent survey by ESET in its North American markets found that more than 30 percent of people polled have never received any cyber training or education in their workplace, even though majority of cyber breaches are caused by employee errors and omissions. About 52 percent of data and information security breaches globally are caused by human error, pointing to a glaring need for cyber security training and awareness within organizations. On the other hand, cybersecurity training can cost hundreds of thousands of shillings per perso...
The fairy tale is over for Mac computers. The position that Apple’s Macs were immune to attacks and therefore did not need anti-virus or other defenses has finally been shattered. Those of us in the security industry have been preaching this for years. Check Point researchers have discovered an email-phishing campaign in Europe that is specifically targeting Mac users. The trojan is the first of its kind for Apple computers, and it phishes for credentials by displaying full-screen alerts that claim there’s an urgent OS X update waiting to be installed. Once it has the keys to the castle, OSX/Dok makes the changes it needs to spy on a victim's web browsing. First it gives administrator privileges to whoever's currently logged in. That allows additional password prompts to be bypass
The sophistication and scope of cyber threats are expected to further escalate as the internet of things develops, yet our defenses remain low. Overwhelmingly, the current strategy is to define the threats, and then build strong defensive walls focused on keeping nefarious agents, viruses or programs out. This means that the similarity between cyber and biological warfare is tough to ignore: in both cases, we deal with evolving adversaries that grow in complexity and gradually vary their means of attack. Currently, digital technologies like the Internet of Things will add $14 trillion to the world's 20 largest economies by 2030. That's one fifth of the current world GDP. However, a major gap has been created between innovations and security. Striking a balance between this two is what wi
Cyber crime has been dubbed “burglary for the 21st Century” around the globe. But the scale of the crimes which can now be committed means millions of finances can now be stolen at the touch of a button. In East Africa, Kenya recorded the highest losses, $171 million, to cyber criminals. Banks have become the leading target of cybercrime as people increasingly adopt the use of financial technology. According to Serianu’s Cybersecurity Report 2016, African countries lost at least $2 billion in cyberattacks in 2016. Tanzania lost $85 million while Ugandan companies lost $35 million. Over one-third of organisations that experienced a breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent, this according to Cisco 2017 Annual Cybersecurity Report.
Malicious cybercriminals aren’t the only ones who want access to your company data. There’s another threat lurking right around the corner: companies. Some of the tech devices from different companies you own could be spying on you and tracking every move you make. Audio giant Bose has been spying on customers who use its wireless headphones by using an app that tracks the music, podcasts and other audio they listen to, a lawsuit charged. Bose, in turn, has been violating customers’ privacy rights by selling their info without permission, according to the federal suit filed Tuesday in Chicago. The complaint filed by Kyle Zak seeks an injunction to stop Bose’s “wholesale disregard” for the privacy of customers who download its free Bose Connect app from Apple or Google Play stores to the