Cyber Criminals Target African Banks

Check Point has revealed that five African nations were among the top 10 most-attacked countries in November 2016 as cyber-criminals made increasing use of ransomware attacks using the Locky and CryptoWall viruses.

In its monthly Global Threat Index, a ranking of the most prevalent malware families attacking organisations’ networks, Check Point noted a 10% increase in the number of attacks using Locky and CryptoWall and found both the number of active malware families and number of attacks remained close to an all-time high as the number of attacks on business networks continued to be relentless.

Generally, African governments have not been fans of social media. According to PC World, officials alleged that on many occasions social media has been used to coordinate protests aimed at overthrowing governments plagued with poor leadership and economic problems.

According to cyber-crime statistics in several African countries, the banking industry is the most affected by cyber-crime, raising fears that Africa may face a slowdown in international investment in the financial sector.

With more Africans now use the Internet for their banking needs, the number of fraudsters eyeing online financial transactions has also multiplied.

Organisations should use advanced threat prevention measures on networks, endpoints and mobile devices to stop malware at the pre-infection stage of the Ransomware attacks.

Tandaabiashara:      Israel To Assist Nigeria With Cybersecurity:     African States Quick To Adopt Network Surveillance:

 

« Canadian Police Investigating Hydro Cyberattack
Yahoo’s Big Breach Is A Catalyst for Change »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Aurec

Aurec

Aurec provides specialist recruitment and contracting services including ICT professionals.

ForgeRock

ForgeRock

ForgeRock, the leader in digital identity, delivers comprehensive Identity and Access Management solutions for consumers, employees and things to simply and safely access the connected world.

Foundation Futuristic Technologies (FFT)

Foundation Futuristic Technologies (FFT)

FFT is a global leader in computer forensics and digital investigation solutions.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

Computer Forensics Consult (CFC)

Computer Forensics Consult (CFC)

Computer Forensics Consult provides disaster recovery, computer forensics, electronic discovery and litigation support services in the growing area of Cyber Security.

Ravelin Technology

Ravelin Technology

Ravelin prevents chargebacks, fraud, and account takeover. Machine learning and human insight combine for highly accurate fraud detection and prevention.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

National Health Care Anti-Fraud Association (NHCAA)

National Health Care Anti-Fraud Association (NHCAA)

National Health Care Anti-Fraud Association is the leading national organization focused exclusively on the fight against health care fraud.

Netizen

Netizen

Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government and commercial markets.

Fortify 24/7

Fortify 24/7

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks.

Nclose

Nclose

Nclose is a proudly South African cyber security specialist that has been securing leading enterprises and building our security portfolio since 2006.

Mindsprint

Mindsprint

Mindsprint (formerly Olam Technology and Business Services - OTBS) are a leading edge technology and business services firm.

Security Discovery

Security Discovery

Stay ahead of cyber threats with Security Discovery. We offer expert consulting, comprehensive services, and a powerful vulnerability monitoring SaaS platform.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.