The dark side of apps
With the world's population of mobile phone users set to reach 4,68-million this year - 2,7-billion of those being smartphone users, mobile device security threats are on the rise. "Apps pose a real problem for mobile users, who give them sweeping permissions, but...
Protection against APT’s everyone’s business
Companies should be as invested in protecting networks and data against advanced persistent threats (APTs) as cyber criminals are in targeting and implementing their attacks. In the past, APT counter measures were only implemented by certain sectors where there were...
Securing and managing devices the modern way
Organisations of all types and sizes are bringing vast numbers of devices into their IT infrastructure and networks. Moreover, these days, these devices are not only smartphones, wearables and tablets, because the Internet of Things (IoT) is seeing a slew of new...
Trend Micro delivers XDR across all workloads
Trend Micro has become the first to offer detection and response capabilities integrated across email, network, endpoint, server and cloud workloads. This is designed to give enterprises broader visibility of a risk posture while connecting minor events from different...
Cloud Atlas APT upgrades with polymorphic malware
Cloud Atlas, an advanced persistent threat (APT), also known as Inception, has updated its attack arsenal with new tools which allow it to avoid detection through standard Indicators of Compromise. This updated infection chain has been spotted in the wild in different...
The rise of nation-state attacks
A new phase of cyber warfare has begun, writes Simon McCullough, major channel account manager at F5 Networks. Hackers acting on behalf of nation-state powers are no longer just out to disrupt critical infrastructures - they're also actively seeking trade secrets. New...
How to protect IoT devices in your business
The Internet of Things (IoT) is making its presence felt in a big way. It is expected that there will be 29-billion connected devices by 2022. This opens a whole world of opportunities for businesses to cement their relevance by evolving how they operate. It also...
How to delete your Twitter account and keep digital memories
There is a tendency to deactivate social media accounts including Twitter and Facebook. It happens due to different reasons: unstable political situation, the risk of being followed, intention to protect one's personal data. Also, a lot of users believe that they are...
Venezuelan military under attack by cyber spies
ESET researchers have discovered an ongoing cyberespionage campaign against high-profile targets in Latin America. More than half of the attacked computers belong to Venezuelan military forces. However, among the included targets are institutions ranging from police...
Fujitsu’s biometric encryption technology provides quicker processing
Fujitsu Laboratories has announced that it has developed a technology that can compare biometric information while it is still encrypted, with the same accuracy and processing speed as conventional biometric authentication systems. Conventional technologies have been...

Security terminology demystified: the worm
A secretive code army hidden inside an innocuous looking email and ready to wreak havoc on your computer empire In our comprehensive guide to all things deadly and dangerous in the world of computer security you would have noticed that, along with Greek mythology...
Cybersecurity trends in 2019
A recent report on cybercrime estimated that hackers could have made as much as 45-billion from their illicit activities in 2018. The staggering number is yet another wake-up call for organizations worldwide to take their cybersecurity measures seriously and pivot...