Cloud Atlas APT upgrades with polymorphic malware
Cloud Atlas, an advanced persistent threat (APT), also known as Inception, has updated its attack arsenal with new tools which allow it to avoid detection through standard Indicators of Compromise. This updated infection chain has been spotted in the wild in different...
The rise of nation-state attacks
A new phase of cyber warfare has begun, writes Simon McCullough, major channel account manager at F5 Networks. Hackers acting on behalf of nation-state powers are no longer just out to disrupt critical infrastructures - they're also actively seeking trade secrets. New...
How to protect IoT devices in your business
The Internet of Things (IoT) is making its presence felt in a big way. It is expected that there will be 29-billion connected devices by 2022. This opens a whole world of opportunities for businesses to cement their relevance by evolving how they operate. It also...
How to delete your Twitter account and keep digital memories
There is a tendency to deactivate social media accounts including Twitter and Facebook. It happens due to different reasons: unstable political situation, the risk of being followed, intention to protect one's personal data. Also, a lot of users believe that they are...
Venezuelan military under attack by cyber spies
ESET researchers have discovered an ongoing cyberespionage campaign against high-profile targets in Latin America. More than half of the attacked computers belong to Venezuelan military forces. However, among the included targets are institutions ranging from police...
Fujitsu’s biometric encryption technology provides quicker processing
Fujitsu Laboratories has announced that it has developed a technology that can compare biometric information while it is still encrypted, with the same accuracy and processing speed as conventional biometric authentication systems. Conventional technologies have been...

Security terminology demystified: the worm
A secretive code army hidden inside an innocuous looking email and ready to wreak havoc on your computer empire In our comprehensive guide to all things deadly and dangerous in the world of computer security you would have noticed that, along with Greek mythology...
Cybersecurity trends in 2019
A recent report on cybercrime estimated that hackers could have made as much as 45-billion from their illicit activities in 2018. The staggering number is yet another wake-up call for organizations worldwide to take their cybersecurity measures seriously and pivot...
Cryptocurrencies help ransomware industry flourish
When City Power announced that a ransomware attack left Joburg residents unable to buy electricity, it highlighted the debilitating effects that a cyberattack can have The increasing frequency and voracity of cyber concerns are mirrored in Aon's 2019 Global Risk...
Kaspersky debuts Hybrid Cloud Security
A new version of Kaspersky Security for Virtualisation Light Agent, part of Kaspersky Hybrid Cloud Security, responds to enterprises' demand for virtualisation security and scalability. It optimises protection rollout for larger virtual machine deployments and...
FaceApp creates wave of opportunity for scammers
The latest hype around the FaceApp application has attracted scammers who want to make some quick profits, ESET research has shown. Scammers have been using a fake "Pro" version of the application as bait and have made an effort to spread the word about this...
Four ways to be safer online
Free and low-cost public Wi-Fi is a great value-add when you don't want to blow the budget on mobile data. But while everyone enjoys the free access at hotels, event venues and malls, we also need to take cyber-precautions - especially in public WiFi hotspots. That's...