Why Africa’s Telecoms Must Actively Collaborate to Combat Fraud
November 24 2022Unique conditions contribute to outsized telecom fraud across the continent, but working together can bring solutions.
Read moreUnique conditions contribute to outsized telecom fraud across the continent, but working together can bring solutions.
Read moreMonths after a fix was issued by a vendor, downstream Android device manufacturers still haven't patched, highlighting a troubling trend.
Read moreThe infostealer Aurora’s low detection rates and newcomer status are helping it fly under the radar, as more cybercriminal gangs target cryptocurrency wallets and communications apps.
Read moreChinese threat actors have already used the vulnerable and pervasive Boa server to infiltrate the electrical grid in India, in spate of malicious incidents.
Read moreFueling the trend are the rising adoption of cloud computing solutions, technology advancements, stricter data safety regulations, and the move to digitalization.
Read moreNew laws have made the current US privacy landscape increasingly complex.
Read moreAs the open source social media network blows up due to Twitter's troubles, researchers caution about vulnerabilities within the application.
Read moreAn AI's "world" only includes the data on which it was trained, so it otherwise lacks context — opening the door for creative attacks from cyber adversaries.
Read moreThe Vietnam-based financial cybercrime operation's primary goal is to push out fraudulent ads via compromised business accounts.
Read more
Recent Comments