- Africa’s natural resources: Will Trump’s policies benefit or exploit the continent?
- US Sanctions Zimbabwe’s gold smuggling Kingpin Kamlesh Pattni
- From Industry 5.0 to Future Finance: AIM Congress 2025’s bold agenda, key partners unveiled
- John Mahama Makes a Comeback as Ghana’s President
- Zambia’s solar energy drive: Fighting rural energy poverty with renewable options
- Nigeria to Ban Corn Exports Amid a Biting Food Security Crisis
- Democracy or diplomacy? Balancing U.S. interests in Africa under Trump 2.0
- African startups hit by funding drought in 2024, but innovation persists
Browsing: Cybersecurity
- An INTERPOL cybersecurity operation that has arrested 1,006 suspects and the busting of 134,089 cybercrime networks in Africa underscores the urgent need for banks to fortify their cybersecurity defenses.
- The probe identified 35,000 victims, with cases linked to nearly $193 million in financial losses.
- This exposure invites the question: Are banks in Africa prepared to counter the threat of cybercrime?
The fintech revolution sweeping across Africa's economy is reshaping banking systems, offering millions of people unprecedented convenience and access to financial services. However, as banks and other financial services institutions embrace innovation, they must contend with a new and evolving threat: cybercrime.
With malicious actors continually adapting their tactics, robust cybersecurity measures are no longer optional for banks; they are critical. Take, for instance, the International Criminal Police Organization (INTERPOL's) Operation Serengeti, which has exposed the grand scale and complexity of cybercrime threats plaguing the continent's financial institutions.
Interpol Cybersecurity
- Ransomware attacks cost the healthcare sector $2.57M, with only 22% of ransomware victims fully recovered in a week or less.
- Organizations with breached backups were twice as likely to pay the ransom to recover encrypted data.
- Insurance providers play a significant role in these ransom payments, contributing to 77% of cases and covering 19% of the total ransom amounts.
Cyber-attacks targeted towards health organisations have increased by 7 per cent in the past year to hit a four-year high since 2021. New findings titled “The State of Ransomware in Healthcare 2024,” by cybersecurity firm Sophos, reveal that healthcare is reporting a rise while other sectors posted a drop.
Of those organizations surveyed, two-thirds or 67 per cent were impacted by ransomware attacks in the past year, up from 60 per cent in 2023.
The rising rate of ransomware attacks against healthcare institutions contrasts with the declining rate of ransomware attacks …
- The 2024 Sophos Threat Report shows data theft is the focus of most malware targeting small and medium businesses.
- Email attacks have moved away from simple social engineering toward more active engagement.
- According to the World Bank, over 90 per cent of the world’s businesses are small- and medium-sized organisations.
Cybercriminals are increasingly targeting data in a new trend in the online security space the 2024 Sophos Threat Report has shown. The report by cybersecurity services firm Sophos sheds light on the dangers faced by small- and medium-sized businesses (SMBs) in the digital landscape.
The 2024 Sophos Threat Report titled “Cybercrime on Main Street” underscores the significant threats looming over SMBs, focusing on the year 2023. According to the report, 50 per cent of malware detected targeting SMBs comprised keyloggers, spyware, and stealers – malicious software designed to steal data and credentials.
Cybercriminals employ these tactics to …
Ugandan President Yoweri Museveni has signed the Computer Misuse (Amendment) Act, 2022, which criminalizes unauthorized access to data and prohibits sharing data relating to legal minors without authorization from parents or guardians. The law also prohibits sending or sharing false, malicious and unsolicited information.
The announcement was made on Thursday, October 14, 2022, by the Presidential Press Unit (PPU). According to the PPU, the president signed four bills into law: the Physical Planners’ Registration Act, the Kampala Capital City (Amendment) Act, the Mining and Minerals Act, and the Computer Misuse (Amendment) Bill.
One legislator introduced the Computer Misuse Amendment Bill 2022 to Uganda’s Parliament and passed it on July 19, 2022.
The Uganda Computer Misuse Act was enacted earlier in 2011 to enhance safety and security in the digital arena by preventing unlawful access, abuse or misuse of information systems including computers and securing the conduct of electronic transactions.…
Phishing is a strong attack method because it is done on a large scale. It stressed that by sending massive waves of emails under the name of legitimate institutions or promoting fake pages, malicious users increase their chances of success in their hunt for innocent people’s credentials.
The article explained that phishers deploy a variety of tricks to bypass email blocking and lure as many users as possible to their fraudulent sites, adding that a common technique is HTML attachments with partially or fully obfuscated code. It stressed that HTML files allow attackers to use scripts, and obfuscate malicious content to make it harder to detect and send phishing pages as attachments instead of links.
According to a recent Interpol report, about 90 per cent of African businesses are operating without the necessary cybersecurity protocols and, therefore, are exposed to cyberattacks. The report also noted that there were more than …
- A sense of well-being encompasses a wide range of factors, including access to education and employment, as well as the lack of armed combat or threats
- Digitization has provided a cheap, secure source of finance to populations in need and improved government transparency in countries where graft and corruption are a huge concern.
- Technological change has also resulted in increased productivity which has in turn improved African’s standards of living
When we think about the quality of life, the first thing that comes to mind is the degree to which an individual is healthy, comfortable, and able to participate in or enjoy life events.
A sense of well-being encompasses a wide range of factors, including access to education and employment, as well as the lack of armed combat or threats.
It is also relative, subjective and has intangible components, such as spiritual beliefs and a sense of belonging.
Rapid
Liquids Intelligent Technologies has reported that over 90 percent of IT decision makers across South Africa, Kenya and Zimbabwe have accelerated their Cyber Security due to the substantial emergence of digital ways of working.
The study established some of the main concerns about Cyber Security threats and the most significant impacts of digital breaches on an organisational level.
A critical insight from the research suggests that 79 percent of businesses from all three countries attribute an increase in Cyber Security threats to the advent of remote working.
Data breaches like data extortion, data leakage and data disclosure constitute almost 71% of the cyber-attacks for Kenyan businesses, and over 70% of South African and Zimbabwean organisations consider email attacks like Phishing the most prominent digital threats.
The participants from the research also indicated an increased consumption of Cloud-based services this year, with the numbers being as high as 96% in South …
The penetration of Information Communication Technology use in Africa has grown tremendously in the new millennium. Close to 600 million (43%) Africans now have access to the internet, up from 4.5 million in 2000. This growth in the use of ICT has brought with it a rise in illicit online activities.
The information found on the internet is largely unfiltered and this exposes the population to fake news and manipulation by scammers. One common scam is the ‘419’ email scam, which derives its name from Nigeria’s criminal code section 419. These scams were common in Nigeria in the 1990s’ and are also referred to as the advance fee scam. It basically involves promising someone a large sum of money if they can pay a certain processing fee.
Even though the tactic may seem ineffective to the techno savvy who are very aware of this old trick, it can be very …
The rise of digital technology presents a myriad of new inventions and conveniences and changes how people interact, communicate, and do business.
The immense benefits of technology carry with them cybersecurity risks. Given the complex and sometimes obscure nature of cyber threats, they are usually difficult to comprehend, identify and control.
Issues of outright theft, hacking, piracy, identity theft, and information misappropriation, among other cyber-related activities, come to the fore when it comes to cyber risks. In addition, national security risks exist in the digital space that poses a significant threat.
According to consulting firm Ovumone, it is estimated that the end of 2022 will see over a billion people having access to the internet. The rising internet access and improved digital usage open up the continent to increased online criminal activity.
…“Cybercrime is shifting towards emerging economies. This is where the cybercriminals believe the low-hanging fruit
Both small and big companies are at risk as the number of attacks will increase during this lock down period. All over the world businesses are urged to embrace online engagement with their customers, and sale of their products.Banking security experts are advising that businesses of all sizes need a plan to defend cybersecurity threats. The following are tips on how to protect data, assets and transactions with any business—small or big, and in any sector.
Cyber-attacks may be launched over the internet or rely on someone with physical access to a company’s premises by using: emails that contain malicious hyperlinks and attachments with messages that often look like they came from a colleague and are commonly referred to as Phishing attempts, or legitimate-looking websites that are set up to capture users’ login credentials, or social engineering to convince unsuspecting employees to reveal confidential information or credentials, or mobile apps …