ransomware

6 Articles
Creating strong passwords
TECHNOLOGY

How To Create Unbreakable Passwords

Unbreakable Passwords: Despite their enormous importance, there are still a high number of bad practices when it comes to managing and creating passwords.

In a statement, Naivas disclosed that it had engaged cybersecurity firm CrowdStrike following a data breach. [Photo/ RMS]
BUSINESSFEATURED STORY

Explained: How Ransomware Attacks Work, as KAA, Naivas Hit

With cyberattacks on the increase in Kenya, businesses of all sizes face a range of attacks. Hits in the past month on Naivas...

Before publishing information, ransomware gangs study the contacts of the company and identify well-known customers, partners and competitors. Kaspersky experts state that the main purpose of this is to maximise target damage, to intimidate victims and to increase the chances of getting a ransom.
BUSINESSTECHNOLOGY

Kaspersky Reveals 5 Game-changing Ways Ransomware Gangs Play Today

“We’ve witnessed a massive transformation in how ransomware gangs play in the market nowadays. The only reason for this shift is their immense...

ESET Partners with Google Play Store www.businesstoday.co.ke
FEATURED STORY

Tighter Security Set-up For Google Play Store

ESET, which has a heavy presence in East Africa, has over the years gained prominence as a cybersecurity leader in threat research.

FEATURED STORY

Ransomware threats to increase next year, report shows

The report, focuses on ransomware, attacks on critical infrastructure, malware and combating criminal activity, as well as the cyber threats posed to electoral...

FEATURED STORY

Researchers find first-ever Android ransomware

DoubleLocker is distributed mostly as a fake Adobe Flash Player through compromised websites. Once launched, the app requests activation of the malware’s accessibility...