Securely Mapping Africa’s Digital Future

The latest cyber-security proposals and guidelines for Africa have proven the need for a unified security strategy across both the public and the private sector, with this being shown across multiple regions, networks and industries. As one of the largest growth areas in the world, the guidelines make a point of discussing how integral it…

An immediate opportunity for CSP’s to increase IoT revenue

IoT devices are expected to exceed mobile phones as the largest category of connected devices in 2018, giving shrewd mobile operators a lot to benefit from. Unlike smartphones whose appetite for data grows every year, IoT devices such as those used to monitor the health of a car engine or for billing water or electricity…

Declawing the CopyCat Malware: Why and How?

Just as the Petya ransomware scheme was discovered and we managed to tackle it, we now face a new challenge to mobile security: CopyCat malware. How does it work? CopyCat generates and steals ad revenues. It’s disguised as popular apps and it infects each device once downloaded by collecting data about the infected device and…

“Ignorance is Bliss” No Longer an Option When It Comes to Mobile Security for consumers

It is an accepted fact that, since the beginning of this decade, cyber-attacks on mobile devices have been growing rapidly, with no signs of slowing down. In fact the prevalence of Mobile-malware designed to infect smartphone operating systems and applications, grew over 300% in 2016. And yet, in the mindset of the consumer, attacks on…