Amidst rapidly changing technological realm, opportunities and challenges that the technology provides has become elusive. We are at a crossroads as we move from a society already snarled with the internet to the coming age of automation, Big Data, and the Internet of Things (IoT). But as the society operates largely on technology, it may have gone too far in technology dependence. While it brings greater benefits, by the very nature of the opportunities it presents it becomes a focal point for cybercrime, industrial espionage, and cyberattacks. The current digital business landscape sees many organisations face a myriad of evolving security threats. Based on experiences, companies today tend to spend 80% of their security budgets on trying to prevent security breaches, but only ...
The fairy tale is over for Mac computers. The position that Apple’s Macs were immune to attacks and therefore did not need anti-virus or other defenses has finally been shattered. Those of us in the security industry have been preaching this for years. Check Point researchers have discovered an email-phishing campaign in Europe that is specifically targeting Mac users. The trojan is the first of its kind for Apple computers, and it phishes for credentials by displaying full-screen alerts that claim there’s an urgent OS X update waiting to be installed. Once it has the keys to the castle, OSX/Dok makes the changes it needs to spy on a victim's web browsing. First it gives administrator privileges to whoever's currently logged in. That allows additional password prompts to be bypass
The sophistication and scope of cyber threats are expected to further escalate as the internet of things develops, yet our defenses remain low. Overwhelmingly, the current strategy is to define the threats, and then build strong defensive walls focused on keeping nefarious agents, viruses or programs out. This means that the similarity between cyber and biological warfare is tough to ignore: in both cases, we deal with evolving adversaries that grow in complexity and gradually vary their means of attack. Currently, digital technologies like the Internet of Things will add $14 trillion to the world's 20 largest economies by 2030. That's one fifth of the current world GDP. However, a major gap has been created between innovations and security. Striking a balance between this two is what wi
Cyber crime has been dubbed “burglary for the 21st Century” around the globe. But the scale of the crimes which can now be committed means millions of finances can now be stolen at the touch of a button. In East Africa, Kenya recorded the highest losses, $171 million, to cyber criminals. Banks have become the leading target of cybercrime as people increasingly adopt the use of financial technology. According to Serianu’s Cybersecurity Report 2016, African countries lost at least $2 billion in cyberattacks in 2016. Tanzania lost $85 million while Ugandan companies lost $35 million. Over one-third of organisations that experienced a breach in 2016 reported substantial customer, opportunity and revenue loss of more than 20 percent, this according to Cisco 2017 Annual Cybersecurity Report.
Malicious cybercriminals aren’t the only ones who want access to your company data. There’s another threat lurking right around the corner: companies. Some of the tech devices from different companies you own could be spying on you and tracking every move you make. Audio giant Bose has been spying on customers who use its wireless headphones by using an app that tracks the music, podcasts and other audio they listen to, a lawsuit charged. Bose, in turn, has been violating customers’ privacy rights by selling their info without permission, according to the federal suit filed Tuesday in Chicago. The complaint filed by Kyle Zak seeks an injunction to stop Bose’s “wholesale disregard” for the privacy of customers who download its free Bose Connect app from Apple or Google Play stores to the