Cyber Criminals Target African Banks

Check Point has revealed that five African nations were among the top 10 most-attacked countries in November 2016 as cyber-criminals made increasing use of ransomware attacks using the Locky and CryptoWall viruses.

In its monthly Global Threat Index, a ranking of the most prevalent malware families attacking organisations’ networks, Check Point noted a 10% increase in the number of attacks using Locky and CryptoWall and found both the number of active malware families and number of attacks remained close to an all-time high as the number of attacks on business networks continued to be relentless.

Generally, African governments have not been fans of social media. According to PC World, officials alleged that on many occasions social media has been used to coordinate protests aimed at overthrowing governments plagued with poor leadership and economic problems.

According to cyber-crime statistics in several African countries, the banking industry is the most affected by cyber-crime, raising fears that Africa may face a slowdown in international investment in the financial sector.

With more Africans now use the Internet for their banking needs, the number of fraudsters eyeing online financial transactions has also multiplied.

Organisations should use advanced threat prevention measures on networks, endpoints and mobile devices to stop malware at the pre-infection stage of the Ransomware attacks.

Tandaabiashara:      Israel To Assist Nigeria With Cybersecurity:     African States Quick To Adopt Network Surveillance:

 

« Canadian Police Investigating Hydro Cyberattack
Yahoo’s Big Breach Is A Catalyst for Change »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Panda Security

Panda Security

Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

Anomali

Anomali

Anomali delivers intelligence-driven cybersecurity solutions to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.

CSIRT-CY

CSIRT-CY

CSIRT-CY is the National Computer Security Incident Response Team for Cyprus.

Cyber Intelligence (CI)

Cyber Intelligence (CI)

Cyber Intelligence is an award winning 'MSC status' cyber security education and training company.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

Data Terminator

Data Terminator

Data Terminator provide a comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National Security Agency (NSA) standards.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Smoothstack

Smoothstack

Smoothstack is a technology talent incubator whose immersive training program kick starts IT careers and delivers a fresh source of IT talent.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

Aliro Security

Aliro Security

AliroNet is the world’s first entanglement Advanced Secure Network solution.

ReformIT

ReformIT

ReformIT is a Managed IT Service and Security provider with many years experience helping companies find the right IT solutions to meet the needs of their businesses.