The growth of cybersecurity into a global industry is the result of the weaponisation of code. Initially, online users could enjoy online communication, commerce and convenience without having to think about security. A local company is making a name for itself in the cyber security world, an industry worth more than $120 billion and counting. The Miamisburg-based Secure Cyber Defense is a young startup, just recently marking two years in business. Shawn Waldman, president and CEO, told this newspaper that its growth was almost immediate. The company provides secure IT consulting, vulnerability scanning, network services, among other security services With the evolution of more of our life into zeros and ones and the rise of the internet of things, cybersecurity needs to be accou
Technology has brought great advances and conveniences, but it also comes with the cost of privacy. Government spies can take total control of your smartphone to look at your browser history, see emails and texts and listen to conversations. The Communications Authority of Kenya (CA) has denied plans to use the yet to be installed Device Management System to carry out phone spying on its users after various media platforms reported so. According to the CA, the Device Management System (DMS), which comes into effect on 21 February, will be able to detect counterfeit devices in the country and stop SIM Box technology which is illegal in Kenya. However, reports in local mainstream media suggest that the system will be able to tap into user's information and the government will have the powe...
Cybercriminals are using 'invisible' malware to attack banks across the globe. Security experts are assisting a change of tactics for the criminal organizations who target the ATMs & online banking credentials. Crooks are now focusing on the banks in the attempt to steal cash directly from the ATMs. According to The Daily Mail, Passwords and financial data have been stolen from more than 140 banks and other enterprises in 40 countries using the organizations' own software. The digital strikes targeted computers that operate automatic teller machines, letting hackers 'push money out of the banks from within the banks'. 'The use of open source exploit code, common Windows utilities and unknown domains makes it almost impossible to determine the group responsible – or even wheth
The IoT is expanding faster than device makers’ interest in cybersecurity. National Cyber Security Alliance and ESET Report indicates that , only half of the 15,527 consumers surveyed said that concerns about the cybersecurity of an IoT device have discouraged them from buying one. Slightly more than half of those surveyed said they own up to three devices—in addition to their computers and smartphones—that connect to their home routers, with another 22 percent having between four and 10 additional connected devices. Yet 43 percent of respondents reported either not having changed their default router passwords or not being sure if they had. Like leaving the front door of your home wide open when you leave, many people leave personal information online for anyone to find. Security
Africa’s thriving economies have an undeniable link to the success of technology on the continent. Though, with these advancements comes the threat of hacking, cyber crimes and malware. Cybercrime is a growing concern for African organisations, as technology evolves, so will the nature and prevalence of cyber threats. Much like taxes and death, cyber security has become a part of our day-to-day lives and it is something that can have a negative impact on both individuals and organisations. As Malawi moves closer to its first ever national cybersecurity strategy, the Malawi Communications Regulatory Authority (MACRA) says the development of the strategy has been boosted by the recent signing into law of the E-transactions and Communications Bills by the State President. MACR