Tag: cyber security

Cyber fraud exacerbated by fake apps-CA Report

Cyber fraud exacerbated by fake apps-CA Report

Cyber Security
A Communications Authority of Kenya (CA) shows report covering October-December 2018 shows a dramatic spike in malware attacks, targeting mobile devices and which has seen unsuspecting Kenyans defrauded in online platforms. A proliferation of mobile applications on popular online stores is thus exposing Kenyans to increased cyberattacks and fraud, the latest sector statistics. ‘‘In particular, there was a rise in cases of malware and the sale of stolen data and credentials including personal data and credit card information,’’notes the report in part. Additionally, the report notes that cyber criminals are targeting their attacks on end-users who have limited cyber security skills. In the three months, the National Kenya Computer Incident Response Team –Coordination
Website breach notifications will now be available on Mozilla Firefox Browser

Website breach notifications will now be available on Mozilla Firefox Browser

Internet, Technology
Mozilla has announced today that it is adding a new security feature to its Firefox Quantum web browser that will alert users when they visit a website that has recently reported a data breach. “We’re bringing this functionality to Firefox users in recognition of the growing interest in these types of privacy- and security-centric features,” Mozilla said. “This new functionality will gradually roll out to Firefox users over the coming weeks.” Mozilla is tying the site breach notification feature to an email account breach notification service it launched earlier this year, called Firefox Monitor, which it also said today is now available in an additional 26 languages. While using the Firefox Quantum browser, when you land on a site that’s been breached, you’ll get a notification. Yo
Companies ought to change their approach to IT security

Companies ought to change their approach to IT security

Cyber Security
Amidst rapidly changing technological realm, opportunities and challenges that the technology provides has become elusive. We are at a crossroads as we move from a society already snarled with the internet to the coming age of automation, Big Data, and the Internet of Things (IoT). But as the society operates largely on technology, it may have gone too far in technology dependence. While it brings greater benefits, by the very nature of the opportunities it presents it becomes a focal point for cybercrime, industrial espionage, and cyberattacks. The current digital business landscape sees many organisations face a myriad of evolving security threats. Based on experiences, companies today tend to spend 80% of their security budgets on trying to prevent security breaches, but only ...
Apple PC no longer Immune to hacks

Apple PC no longer Immune to hacks

Cyber Security, Technology
The fairy tale is over  for Mac computers. The position that Apple’s Macs were immune to attacks and therefore did not need anti-virus or other defenses has finally been shattered. Those of us in the security industry have been preaching this for years. Check Point researchers have discovered an email-phishing campaign in Europe that is specifically targeting Mac users. The trojan is the first of its kind for Apple computers, and it phishes for credentials by displaying full-screen alerts that claim there’s an urgent OS X update waiting to be installed. Once it has the keys to the castle, OSX/Dok makes the changes it needs to spy on a victim's web browsing. First it gives administrator privileges to whoever's currently logged in. That allows additional password prompts to be bypass
Online safety Can Become the ‘Immune System’ of Digital Transformation in organizations

Online safety Can Become the ‘Immune System’ of Digital Transformation in organizations

Cyber Security
The sophistication and scope of cyber threats are expected to further escalate as the internet of things develops, yet our defenses remain low. Overwhelmingly, the current strategy is to define the threats, and then build strong defensive walls focused on keeping nefarious agents, viruses or programs out. This means that the similarity between cyber and biological warfare is tough to ignore: in both cases, we deal with evolving adversaries that grow in complexity and gradually vary their means of attack. Currently, digital technologies like the Internet of Things will add $14 trillion to the world's 20 largest economies by 2030. That's one fifth of the current world GDP. However, a major gap has been created between innovations and security. Striking a balance between this two is what wi