Orange Egypt CEO charts new path.

Orange Egypt
charts new path

ICT minister has met
telco's new CEO.


Monday, May 21st

Check Point research raises alarm on AdultSwine, Scareware

Check Point research raises alarm on AdultSwine, Scareware

Global IT security firm Check Point Software Technologies is this week hosting this year's first CPX360 cyber security event in Barcelona. Several IT and cyber security issues are up for discussion, including the impact of trends such as Scareware and similar emerging threats.

The event is organised for cyber security experts and business leaders to collaborate and help unravel the dynamics of today's threat landscape and how to prepare for the next major attack. It will focus on cloud security, zero-day threats, mobile device, infinity threat prevention, as well as security architecture, among other key themes.

Check Point CEO and Founder Gil Shwed is scheduled to provide insight into the threat landscape and offer a prediction of future cyber threats and security technologies.

In his presentation titled Internet of Things: Is winter coming? the company's VP of Security Solutions Avi Rembaum will offer insight into what future IOT will look like and offer a summary of future cyber risks, with a description of the practical security needed to plan IOT implementations.

'AdultSwine'

CheckPoint researchers recently revealed malicious code on Google Play Store that hides itself inside roughly 60 game apps, several of which are intended used by children. According to Google Play's data, the apps have been downloaded between 3 million and 7 million times.

According to the IT security software firm, the malicious apps, dubbed 'AdultSwine', wreak havoc by displaying ads from the web that are often highly inappropriate and pornographic, attempting to trick users into installing fake 'security apps' and inducing users to register to premium services at the user's expense.

"In addition, the malicious code can move laterally within the infrastructure of the phone, opening the door for other attacks such as user credential theft. Once the infected app is installed on the device, it waits for a boot to occur or for a user to unlock their screen in order to initiate the attack. The attacker then selects which of the above three actions to take and then display on the device owner's screen," reads a statement from the company.

Africa under threat

The company's regional leadership have warned that Africa needs to upgrade its cyber security and cyber crime detection systems to combat emerging threats.

According to the company's latest global threat index released in October last year, Botswana is the most threatened country on the continent, followed by Morocco (ranked in 7th place), Cameroon (8th), Egypt (12th), Nigeria (13th), Malawi (17th), Uganda (18th), then Zambia (20th)

Last year Steve McWhirter, Vice President of Asia Pacific, Middle East, and Africa at Check Point Software Technologies, is quoted as saying the threats to really be concerned about are the ones never heard of and that is where the continent hasn't yet managed its transition.

ALSO ON ITWEB AFRICA

Lighting the way forward with K8 Published on 18 May 2018

With the fully integrated business view and information provided by the newly implemented K8 system, the Lighting Warehouse was able to get closer to its customers, build profits and manage margins in a much easier and more streamlined manner.

Denial only diminishes Africa's cyber security Published on 14 May 2018

Perspective on the ability of African businesses to protect themselves from prevalent, increasingly sophisticated cyber threats.

African start-up uses blockchain to disrupt music's value chain Published on 10 May 2018

Why shokoCAST founder believes platform has the mettle to secure early traction in an ultra-competitive market.