Magazine Button

Ransomware

Countering the new generation of attacks driven by COVID-19

Cyberattacks in the form of ransomwares are evolving in the global pandemic situation. Subhalakshmi Ganapathy, Product Evangelist, ManageEngine, explains how these new ransomware work. With the spread of the Coronavirus disease (COVID-19) around the world, cybercriminals are leveraging the fear and uncertainty that’s prevailing around the pandemic and launching unscrupulous ransomware attacks on healthcare institutions […]


Ransomware: Here today, here tomorrow

Cybercriminals do not take a break when a pandemic hits, and with many networks increasingly vulnerable as more people work from home, now is the time to try and avert threats. Derek Manky, Chief Security Insights and Global Threat Alliances, Fortinet, explains how to improve your cybersecurity. With all our energy of the past several […]


MicroWorld joins Microsoft Intelligent Security Association

Cybersecurity provider MicroWorld has become part of the Microsoft Intelligent Security Association. Microsoft has brought together an ecosystem of cybersecurity providers to integrate their technology with Microsoft security products to provide their customers with high-quality security with few integration challenges. As a Microsoft gold partner, joining the association strengthens MicroWorld’s work with Microsoft. “We are […]


SophosLabs Uncut releases detailed malware analysis of new ransomware called MegaCortex

According to Sophos, a global leader in endpoint and network security, MegaCortex was a relatively little-seen malware that suddenly spiked in volume on May 1. Sophos has seen MegaCortex detections in the US, Canada, Argentina, Italy, the Netherlands, France, Ireland, Hong Kong, Indonesia and Australia. The ransomware has manual components similar to Ryuk and BitPaymer, but the […]


Proofpoint releases Cloud Application Attack Snapshot research

Proofpoint, a leading cybersecurity and compliance company, has released its Cloud Application Attack Snapshot: Q1 2019 research, which examined over 100, 000 cloud application attacks aimed at global organisations between September 2018 and February 2019. Overall, targeting attempts increased by 65% during that time period with 40% originating in Nigeria. Cloud application attacks use intelligence driven brute-force techniques (to crack passwords) and sophisticated phishing methods to lure victims into clicking and revealing […]


Intelligence shows that IoT bot attacks are contining

NETSCOUT Arbor, which specialises in advanced Distributed Denial of Service (DDoS) protection solutions, has shared intelligence released by its security research and analysis team – Arbor’s Security Engineering and Response Team (ASERT). Bryan Hamman, Territory Manager for Sub-Saharan Africa at NETSCOUT Arbor, said: “Earlier this year, we released news of the trends we foresaw happening […]


Increased cloud adoption highlights need for improved cyber resilience

Microsoft’s announcement that it has launched its first cloud data centres in Africa – one in Cape Town, another in Johannesburg – has been a cause for celebration among South Africa’s business sector. And as Mikey Molfessis, cybersecurity expert at Mimecast South Africa explains, as we hurtle into the Fourth Industrial Revolution, access to cloud […]


Trend Micro expert on the tactics used by cybercriminals to rob banks

In the early 1980s, South Africans were gripped by tales of the most infamous bank robbery gangs the country had ever known – The Stander Gang. The gang would boldly walk into banks, brandishing weapons, demand cash and simply disappear. These days, a criminal doesn’t even have to be in the same country as the […]


J2 Software CEO on the importance of securing your password

J2 Software CEO John McLoughlin on how to to keep your passwords secure.   Password breaches are all too common nowadays and the biggest challenge is to keep a different complex password for every website or app. Most people use the same passwords on multiple sites and when one of those sites is compromised, hackers […]


Tech support scams are a growing threat, according to Trend Micro

Hackers are always on the lookout for new ways to make more money. Cybercriminals have an impressive arsenal of tools to use in order to retrieve data or money from someone’s network. One of the methods that they are using far more often is the tech support scam Microsoft received over 150,000 reports globally in […]


Browse our latest issue

Magazine Cover

View Magazine Archive