Cyber Security

National Cybersecurity Centre warns of spike in cybersecurity threats

National Cybersecurity Centre warns of spike in cybersecurity threats

Business, Cyber Security, Technology
The National Cybersecurity Centre (NCC) detected over 3.8 million cyber threats in the first quarter of 2018-2019, indicating that Kenyans continue to be at a high risk of online attacks. According to a new report by the Communications Authority of Kenya (CA), the threats represented an increase of 11.76 per cent from the last quarter of the year where 3.4 million threats were detected. CA attributed the increased threats to enhanced cyber threat detection capabilities through deployment of additional sensors and increased resources towards cyber threat analysis “The cyber threats detected varied from denial-of-service (DoS) including botnet and brute-force attacks that led to denial of computer services and illegal access to computer systems; online impersonation
Did another latest Facebook bug leak your photos?

Did another latest Facebook bug leak your photos?

Cyber Security, social media, Technology
An estimated 6.8 million users were affected in the latest photo leak caused by a bug its app development platform that let apps access the private pictures of users, Facebook has revealed. Apps are expected to only have access to images posted on a user’s timeline, however a bug let the apps see any images linked to the account. This includes images on Facebook Stories and Facebook Marketplace, as well as those uploaded but not published. Facebook stores the latter for three days before they are deleted, in case the user decides to publish them. Users are required to give permission for apps to view photos, and only users who gave picture permissions had their images leaked to the apps. Facebook said the bug was active for 12 days between September 13th and September 25th,
You should never recycle passwords

You should never recycle passwords

Cyber Security, Mobile, social media
Using one password for everything is convenient, but it’s also dangerously insecure. We examine the case of Mark, a young designer. Mark is a regular guy. He has e-mail, Facebook, Instagram, Amazon, eBay, Steam, and Battle.net accounts, not to mention ones for another dozen online stores and a forum dedicated to his favorite video game. The accounts are all linked to his e-mail. One day, the customer database of one of the online stores Mark has an account at suffers a leak (apparently it was kept unencrypted on an open-access server). No credit card information is stolen, but e-mail addresses, names, and passwords are. At first glance, there seems no particular reason to worry. Such leaks happen, and this is just a small online store — can you blame a humble shopkeeper
Cloud-based security solutions will power cyber security in 2019

Cloud-based security solutions will power cyber security in 2019

Business, Cyber Security, Technology
Based on interactions with organisations, a technology firm has released key trends for 2019 in the area of cyber security space. Matt Gyde, Group Executive (Cybersecurity) of Dimension Data, identifies five key trends that will empower the space. According to him, the trust will go digital as the technology helps organisations to embrace Digital Trust model, moving away from the present Zero Trust (don't trust anything, any person inside or outside the organisation) model. "In 2019, Zero trust is maturing into digital trust. IT will leverage ‘digital fingerprints’ for smoother authentication of users and provide them with easier access to apps and information," he says. "Identity-as-a-Service, user authentication, identity and access management are expected to be the largest segmen
Alarming Report: Microsoft collects & stores personal behavioral data on a large scale via Office 2016/365

Alarming Report: Microsoft collects & stores personal behavioral data on a large scale via Office 2016/365

Cyber Security, Technology
A new impact assessment shows privacy risks Microsoft Office ProPlus Enterprise. On behalf of the Ministry of Security and Justice, Privacy Company carried out a DPIA on DPIA on Microsoft Office ProPlus (Office 2016 MSI and Office 365 CTR). At the request of the Ministry, they published a blog about the findings. The SLM Rijk conducts negotiations with Microsoft for approximately 300.000 digital work stations of the national government. The Enterprise version of the Office software is deployed by different governmental organisations, such as ministries, the judiciary, the police and the taxing authority. The results of this Data Protection Impact Assessment (DPIA) are alarming. Microsoft collects and stores personal data about the behaviour of individual employees on a large scale...