Positioning Identity Verification in the Society

Identity verification is not a topic that comes up frequently in daily discussions. Except you are directly involved in identity access and management in your work, research, or both, identity verification may not be an issue for you. However, as we recurrently read and hear of the increasing number of high-profile data breaches suffered by…

Is your Cybersecurity strategy part of your operational strategy?

The need for an effective cybersecurity strategy has become necessary as businesses continue to seek better ways to link their processes to cutting edge technologies. The dependence on the cyber infrastructure has resulted in the need for an effective cybersecurity strategy as a key to protecting business assets and core processes. The ubiquity of technology…

Managed security service provider benefits

In the wake of the need for secured networks, businesses have approached achieving better security the way some people approach achieving better fitness. They spend a lot of money buying security products and boxes, more like the way people purchase expensive health club memberships. If businesses fail to follow through in having the right expertise…

Coinhive malware: Hackers new trick for “easy money”

Cryptocurrency has been the buzz word in the IT landscape lately as hackers continue to seek new opportunities to earn big by getting more sophisticated. Crypto-hijacking is an unauthorized use of computer resources to mine cryptocurrency. Hardware and electricity pose the biggest resource challenge to cryptocurrency miners. Hence, they have resorted to the use of…

“Rapid” ransomware continues to spread rapidly

A new ransomware dubbed “Rapid” has been reported to be spreading. Rapid Ransomware’s can be spread through targeted emails containing links and attachments. A click on any of such links or attachments will lead the command execution. The ransomware then scans the computer for files to encrypt. An encrypted file will have the .rapid extension (as…

WannaMine: Cryptocurrency mining malware on the rise

WannaMine, unlike the traditional ransomware, is a portmanteau word that refers to a malware family that combines the network spreading capabilities of WannaCry to deliver cryptomining malware rather than ransomware. Crypto-mining is a technique used by crooks to covertly use the processing power of several computer systems to do the necessary calculations for generating cryptocurrencies such as,…