Mobile Malware & the Evolution of Risk

Mobile devices are integrated into the daily lives of most people and they tend to hold an alarming amount of data about their owners, making them vulnerable targets for malware attacks. The data typically includes details on online and physical activities and behaviour, as well as family members and friends, and passwords together with other personal credentials.

4 Mobile Security threats – what to do about them

Mobile security is a growing trend with most of us having at least one smartphone and possibly a tablet. The following are 4 reasons why the security of your mobile device should be taken into consideration: (i) Malware, (ii) Unsecure Wi-Fi connections, (iii) Phishing attempts and (iv) Data leaking Apps.

Complete the form below to sign up to the Cyber Security Bulletin

Security Bulletin
First
Last

Beyond backup and recovery – PoPI Act compliance requires understanding of how data is managed

The Protection of Personal Information (PoPI) Act, which came into force on 1 July this year, has compelled organisations to take a closer look at their data management in terms of how it is stored, what data is stored and for how long this data must be stored.

How Account Take-Overs Happen

Account takeovers cause online identity theft, when criminals steal personal information stored in online accounts. With stolen accounts and information, hackers can then buy goods with your credit card, for example, or take out loans in your name. To take over your accounts, hackers need your password and user­name. Here are 5 possible ways that they can steal these items:

Whitepaper on ROI of Cyber Security

F-Secure’s cyber security ROI calculator is out now! Learn about the factors behind the formula and see some example calculations from different industries and company sizes. Also apply the calculator to your business case and share the results with your internal stakeholders.

Webinars:

Key Data Protection Strategies to Prevent Cyber Attacks

Tuesday, 2 November 11:00 AM (SA time)

The live Webinar being held is a joint presentation by Cybervision together with Security Specialists F-Secure and Data Management Professionals DMP-SA on the best practices to adopt a holistic data protection strategy to identify, protect, detect, respond and recover from ransomware and other cyberattacks.

Register for the Webinar

Understanding the Phishing Kill Chain to build Holistic Phishing Defence

Tuesday 16 November 2021, 11:00 AM (SA time)

Despite organisations’ best efforts to address the weakest link in cyber security, at least 36% of global breaches still have phishing. The following topics will be discussed in the webinar by iOCO and F-Secure in partnership with ITWeb.

Register for the webinar

Threats in the Wild

New phishing attack features weaponized Excel file
A new phishing campaign is targeting employees in the financial services industry using links that download what experts are describing as a ‘weaponized’ Excel document.

FluBot Adroid malware spreading
A new Android malware called Flubot has been spreading rapidly in Europe this year and is also likely to spread elsewhere in the world.

BitCoin subjected to scams after cyber attack
BitCoin.org cryptocurrency was taken down last month after a cyber attack that took control of the organisation’s domain in a scam that promised individuals to have their money doubled if they sent cash to BitCoin.

This bulletin is intended to increase the security awareness in organisations by providing useful information to help enhance security and safety when using computing devices and the Internet.

Be sure to consider some of the cyber threats out there and consider these tips for protecting yourself and your devices. Until our next mailer, you can check out all the great resources we have available on our website.

The Cybervision Team