Kenya’s CMA warns over ICO.

Kenya's CMA warns of danger

Initial Coin Offers unregulated, it says.

Zim TelOne rules out debt write-off

Friday, Feb 23rd

Check Point research raises alarm on AdultSwine, Scareware

Check Point research raises alarm on AdultSwine, Scareware

Global IT security firm Check Point Software Technologies is this week hosting this year's first CPX360 cyber security event in Barcelona. Several IT and cyber security issues are up for discussion, including the impact of trends such as Scareware and similar emerging threats.

The event is organised for cyber security experts and business leaders to collaborate and help unravel the dynamics of today's threat landscape and how to prepare for the next major attack. It will focus on cloud security, zero-day threats, mobile device, infinity threat prevention, as well as security architecture, among other key themes.

Check Point CEO and Founder Gil Shwed is scheduled to provide insight into the threat landscape and offer a prediction of future cyber threats and security technologies.

In his presentation titled Internet of Things: Is winter coming? the company's VP of Security Solutions Avi Rembaum will offer insight into what future IOT will look like and offer a summary of future cyber risks, with a description of the practical security needed to plan IOT implementations.

'AdultSwine'

CheckPoint researchers recently revealed malicious code on Google Play Store that hides itself inside roughly 60 game apps, several of which are intended used by children. According to Google Play's data, the apps have been downloaded between 3 million and 7 million times.

According to the IT security software firm, the malicious apps, dubbed 'AdultSwine', wreak havoc by displaying ads from the web that are often highly inappropriate and pornographic, attempting to trick users into installing fake 'security apps' and inducing users to register to premium services at the user's expense.

"In addition, the malicious code can move laterally within the infrastructure of the phone, opening the door for other attacks such as user credential theft. Once the infected app is installed on the device, it waits for a boot to occur or for a user to unlock their screen in order to initiate the attack. The attacker then selects which of the above three actions to take and then display on the device owner's screen," reads a statement from the company.

Africa under threat

The company's regional leadership have warned that Africa needs to upgrade its cyber security and cyber crime detection systems to combat emerging threats.

According to the company's latest global threat index released in October last year, Botswana is the most threatened country on the continent, followed by Morocco (ranked in 7th place), Cameroon (8th), Egypt (12th), Nigeria (13th), Malawi (17th), Uganda (18th), then Zambia (20th)

Last year Steve McWhirter, Vice President of Asia Pacific, Middle East, and Africa at Check Point Software Technologies, is quoted as saying the threats to really be concerned about are the ones never heard of and that is where the continent hasn't yet managed its transition.

ALSO ON ITWEB AFRICA

Ransomware, 'malvertising' and cryptominers dominate cyber threat landscape Published on 12 February 2018

Research shows that from July to December 2017, one in five organisations were impacted by cryptomining malware.

Nimbus acquires stake in Paratus Africa Published on 08 February 2018

Paratus CEO says company plans to invest over N$150 million on infrastructure, the bulk of which will be invested in fibre.

It's time for a modern cloud-based financial reporting system Published on 20 February 2018

Businesses may want to contemplate finding a more comprehensive solution like Acumatica that includes cloud financial reporting software, says One Channel CEO Bernard Ford.

Secure now, secure strong to combat Gen V threats says Check Point Published on 15 February 2018

Global provider of cyber-security solutions used its CPX360 event to outline new security module and details of its Gen V product strategy.