Certified protection to counter banking malware threats
These days, there isn't much that can't be done on mobile, and that includes banking. For many people, banking apps are the go-to method of managing finances. As a result, mobile banking malware targeting Android phones has become a serious and somewhat underestimated...
Build a human firewall to fight human errors
With Kaspersky research showing 970 557 phishing attacks detected in South Africa in Q1 2019 alone - an average of 10 783 per day - and 53 829 mobile malware attacks in the same period - an increase of 6% compared to Q1 2018 - one has to ask how vulnerable companies...
Strengthening cybersecurity with a zero trust approach
In response to sophisticated and targeted cyberattacks, organisations have begun to shift their focus to proactive strategies that employ advanced cybersecurity technology and techniques. Threat Hunting, a strategy for investigating potential threats before they cause...
Check Point debuts Malware DNA
Check Point Software Technologies has introduced a new artificial intelligence-based malware detection engine to its SandBlast Network threat prevention solution, to enable even faster, more accurate prevention of malicious attacks. The new Malware DNA engine...
Kaspersky enables machine learning to protect against advanced threats
Kaspersky Internet Security for Android has been strengthened with a new feature for combating the evolving malware landscape - Cloud ML for Android. The new feature, based on machine learning technology, ensures immediate proactive detection of advanced and...
Protecting cryptocurrency in Africa
With bitcoin experiencing a price rally recently, interest in this and other cryptocurrencies are regaining momentum. The potential disruption from these digital currencies, especially in Africa, can be significant for traditional financial service providers. However,...
LoudMiner uses virtualisation software to mine cryptocurrency
ESET researchers have discovered an unusual cross-platform cryptocurrency miner called LoudMiner. LoudMiner uses virtualization software - QEMU (short for Quick Emulator) on macOS and VirtualBox on Windows - to mine cryptocurrency on a Tiny Core Linux virtual machine....
Four essential cloud security concepts
Possibly the most important attribute of the cloud is that critical business applications, can be deployed, managed, and distributed faster and easier than by any other method, giving employees and customers real-time access to critical information--wherever they are...
BT enhances its cyber capabilities in Europe
BT has announced the opening of a new Cyber Security Operations Centre (Cyber SOC) in Paris, as well as announcing upgraded facilities, new customer solutions and recruitment at its existing SOCs in Madrid and Frankfurt. BT’s global network of Security Operations...
Imperial College protects research data with software-defined storage
Solutions from ArcaStream and Excelero are part of a new software-defined storage deployment at Imperial College London, one of the world's leading university research centres for science, engineering, medicine and business. By moving to a single high-performance...
Demystifying cloud cybersecurity
With the rise of edge data centres and an increase in cloud-based computing, companies are facing new challenges in end-to-end cybersecurity. To ensure proper protection, data centre teams must now assess both internal processes and strategies used by cloud suppliers....
Eset is Canalys cybersecurity champion
Eset has achieved Champion status globally for the first time in Canalys Cybersecurity Leadership Matrix 2019. Canalys is a leading global technology market analyst firm with a channel focus; it strives to guide clients on the future of the technology industry and to...