Slingshot gives attackers full control over infected devices
The threat has been used for cyber espionage in the MEA from at least 2012 until February this year, says Kaspersky Lab.
Airline Emirates 'leaking customers' sensitive data'
Personal data is being shared with third-party marketing partners, says Konark Modi, a data security engineer.
Cyber criminals borrow APT techniques to install mining software
With the aim of earning crypto-currency, criminals have started to use mining software in their attacks, says Kaspersky Lab.
WordPress users warned of malware impersonating ionCube files
The malicious code is used by attackers to create backdoors on vulnerable Web sites allowing them to steal data or plant additional malware.
- SPONSOR MESSAGEkeyboard_arrow_down
ContinuitySA provides business resilience solutions, giving all stakeholders complete peace of mind. Fully managed services include cyber resilience, ICT resilience, ERM, work area recovery and BCM advisory. ContinuitySA operates recovery sites in Midrand, Randburg, Tyger Valley, as well as Botswana, Mozambique, Kenya and Mauritius.