10 tips for Zoom security and privacy

With social distancing and quarantine measures implemented around the globe, people quickly started searching for effective means of communicating with each other. With its reported ease of use and attractive pricing, Zoom quickly rose in popularity — and people quickly figured out that Zoom’s developers weren’t fully prepared for the level of scrutiny it would Read more about 10 tips for Zoom security and privacy[…]

Kaspersky receives certification for its data security systems

Information Security Management Compliance: ISO/IEC 27001:2013 TÜV AUSTRIA has certified that Kaspersky applies a management system in line with the ISO/IEC 27001:2013 standard in the delivery of malicious and suspicious files using Kaspersky Security Network (KSN) infrastructure, as well as safe storage and access to these files in the KLDFS system (further – Data Service). Read more about Kaspersky receives certification for its data security systems[…]

Moyo Media Co. Ltd arranged Cyber Security training for the students of Open University of Tanzania – Pemba Regional Center

It was a special week for Moyo Media Co. Ltd. We have conducted several trainings from different institutions in different aspect/arena including Cyber Security, Marketing, e-Government etc. Some of the students of the Open University of Tanzania at Pemba Regional Center and other stakeholders participated the training conducted by Moyo Media Co. Ltd and it Read more about Moyo Media Co. Ltd arranged Cyber Security training for the students of Open University of Tanzania – Pemba Regional Center[…]

Moyo Media Co. Ltd yatoa mafunzo ya serikali mtandao kwa Shirika la Huduma za Maktaba – Pemba

Mafunzo hayo yalifanyika katika ukumbi wa American Space Pemba na kuhudhuriwa na wafanyakazi wa Shirika la Huduma za Maktaba – Pemba. Miongoni mwa mada zilizowasilishwa katika mafunzo hayo ni pamoja na usalama wa mitandao, serikali mtandao, huduma za serikali mtandao n.k Pia wafanyakazi hao walipatiwa mafunzo kwa vitendo juu ya utumiaji wa huduma ya barua Read more about Moyo Media Co. Ltd yatoa mafunzo ya serikali mtandao kwa Shirika la Huduma za Maktaba – Pemba[…]

Dating apps a hotbed for cyber threats in UAE, says Kaspersky

The UAE accounts for 17 percent of cyber-attacks disguised as dating apps in the region, according to new research from cyber security firm Kaspersky. According to Kaspersky’s analysis of threats in the region, there were 658 threats under the guise of more than 20 popular dating applications, with 2,082 attacks on 1,352 users detected. The Read more about Dating apps a hotbed for cyber threats in UAE, says Kaspersky[…]

Moyo Media Co. Ltd conducted Cyber Security & Marketing training for PACSO management and its organizations’ members

In recent years, criminals have shifted their efforts into cyberspace — with the right tools and know-how, they can commit crimes in the comfort of their living rooms. Cybercriminals today use malware, phishing and spam to scam victims out of various amounts of money. Whether it is online banking systems, email accounts or even online Read more about Moyo Media Co. Ltd conducted Cyber Security & Marketing training for PACSO management and its organizations’ members[…]

TP-Link Routers Give Cyberattackers an Open Door to Business Networks

A firmware vulnerability in TP-Link Archer C5 v4 routers (used in enterprise and home environments) could allow unauthorized, remote access to the device with administrative privileges. The bug (CVE-2017-7405) affects models that run firmware version 3.16.0 0.9.1 v600c.0 Build 180124 Rel.28919n. First discovered by IBM X-Force Red’s Grzegorz Wypych, it could allow a remote attacker Read more about TP-Link Routers Give Cyberattackers an Open Door to Business Networks[…]

Rethinking Responsibilities and Remedies in Social-Engineering Attacks

The idea that humans are the weakest link shouldn’t guide the thinking on social-engineering defense. In the pantheon of catchy cybersecurity slogans that should never have caught on, two about social engineering spring to mind almost immediately: “End users are the weakest link” and “attackers only have to be lucky once; defenders have to be Read more about Rethinking Responsibilities and Remedies in Social-Engineering Attacks[…]