The company has uncovered a massive attack on Android users via malicious ads on Facebook.
Driven by cloud, mobility and big data, enterprise security must reorient around identities.
Cyber crooks take advantage of the user-friendliness of AndroRAT to exploit the app, says Intact Security
Over a million South Africans fell victim to cyber crime in the past year, amounting to R2?367 per victim, says Symantec.
Through social networking and 'personal cloud' accounts, personal privacy became a recurring issue, according to the report.
The scam dupes unsuspecting consumers into believing Microsoft representatives will resolve virus problems.
The list includes expected advances in ransomware, hacking of Internet of Things devices, and critical infrastructure exploits. [Local rep: Robinson Distribution]
Having the most updated software available dramatically increases users chances of avoiding drive-by attacks, says Intact security.
The 2014 Predictions Report examines trends in the evolution of ransomware, advanced evasion techniques and social attacks.
In 2014, Sophos predicts greater focus from cyber criminals on high quality and convincing phishing and social engineering scams. [Local rep: NetXactics]
The world is not prepared for the influx of zero-day exploits and attacks that will come into play in 2014, says Trend Micro.
Cyber criminals use ransomware to extort businesses by holding PCs or data hostage, says Check Point Technologies.