The reality of the cyber threats posed today is that many threat actors are not rogue operators acting on their own but are, instead, working as part of sophisticated and organised groups, collaborating with other groups within a wider ecosystem of specialists. These groups build significant financial resources over time, derived from the proceeds of commercially-driven attacks, or gathered as payment from states sponsoring or directly commissioning their activities. This is according to Yaroslav Rosomakho, Field CTO of Netskope, a global cybersecurity leader which is redefining cloud, data, and network security to help organisations apply Zero Trust principles to protect data. He explains: “Threat actors use these resources to improve their subsequent attacks, paying for infrastructure or...
Image sourced from Pixabay. Kaspersky VPN Secure Connection was awarded among the best VPNs for streaming, gaming and torrenting for private users by AV-TEST, the independent IT security institute. Kaspersky VPN Secure Connection was praised for its speed ratings and beat leading global competitors in VPN transparency ratings. Virtual private networks (VPNs) have multiple uses including anonymous surfing, secure downloads, messaging, as well as providing access to local content on streaming platforms. They’ve also become a necessary feature for gamers, allowing them to tune their ping when gaming and providing uninterrupted gameplay. This is an important aspect of VPNs as the gaming industry is rapidly growing with a current value of over $300 billion and a continuously expa...
Image sourced from intelligenttransport.com Ride-hailing services, such as Uber, are transforming the way we move around. A few clicks on a smartphone can have you on your way in no time, meeting the modern consumer’s need for on-demand, accessible and convenient services. According to a recent report by Genesis Analytics and the Financial Sector Conduct Authority (FSCA), data from the South African Police Services shows that carjacking incidents have increased across the country over the past three years (2018 – 2020), jumping by a 10% compound annual growth rate (CAGR). Uber collaborated with AURA in 2018. AURA is South Africa’s security and medical response platform which currently has more than 250,000 active users. The collaboration provides drivers and riders on the Uber platform acc...
Anna Collard, SVP Content Strategy & Evangelist at KnowBe4 Africa. In 2021, phishing attacks increased by 7.3% according to the ESET Threat Report, and the Cisco 2021 Cybersecurity threat trends report revealed that around 86% of organisations had at least one person click a phishing link. This echoes the findings of recent KnowBe4 Security Awareness Research that found people keep clicking – on fake emails from HR, the business and IT. As Anna Collard, SVP Content Strategy & Evangelist at KnowBe4 Africa, points out, the majority of top email categories that people fall for are those that fit in to everyday life – invoices, purchase orders, shared files, and COVID-19 related topics. “As our quarterly report on the top-clicked phishing tests shows, the emails that catch people are t...
Despite the latest technology, the world has yet to crack the code for privacy and security online. But that isn’t the only big problem we need to worry about. Hackers and robbers are tricking innocent users into giving up their private information as society becomes increasingly digital — and virtual currencies have a role in all of this. Cryptocurrencies smashed records in 2022, with the market topping $2 trillion for the first time ever. And while this has been greeted with excitement by current investors, it’s made others more wary. Why? Because as the asset class grows, it becomes more appealing to malicious actors. And for evidence of this, you only need to look at the growing number of users being targets of cryptocurrency robberies. The big question is this: if these cr...
Small businesses are the backbone of every growing economy, bringing growth and innovation to the communities in which they are established. However, these businesses are often vulnerable when conforming to the new standards of remote work. Today, one of the greatest threats to small businesses is a cyberattack. According to the Wall Street Journal, companies with less than $10 million in annual revenue are less likely to be prepared for cyberattacks. Fireeye also reports that while 77% of all cybercrimes are directed toward small businesses, only 42% of small business owners are concerned with cyber security. The National Small Business Association reports that as many as 60% of small businesses will fail within six months of experiencing a significant cyber breach. These findings clearly...
Image sourced from Packetlabs. Russia’s war on Ukraine and its increasingly isolated internet environment could drive Russian cybercriminals to think outside the box and launch new forms of cyber attacks. This is according to Nclose’s Co-Founder & Technical Director, Martin Potgieter, who says speculation and concern is mounting around the world, over what Russia’s cyber crime syndicates’ next moves will be. “Currently, the cybercrime focus appears to be predominantly between Russia and Ukraine cybercrime groups and governments. While this is strictly speaking cyber warfare, it could quickly spread elsewhere. “What we are seeing is that a few of these cybercrime groups are either taking sides or imploding amongst themselves due to their Eastern European links with one another,” says Po...
Image sourced from Pixabay. Mobile applications for connected cars provide various features to make life easier for motorists, but they can also be a source of risk. Kaspersky experts have analysed 69 popular third-party mobile applications designed to control connected cars and defined the main threats drivers may face while using them. They found out that more than half (58%) of these applications use the vehicle owners’ credentials without asking for their consent. On top of this, one in five of the applications have no contact information, which makes it impossible to report a problem. These and other findings are published in the new Kaspersky Connected Apps report. Connected automotive applications provide a wide range of functions to make drivers’ lives easier. For example, the...