COVID-19 | The Cybersecurity Effect of the Pandemic

By: Edem Glymin, Lead security and risk consultant for Global Secure Solutions Ghana Limited. How did we get here? Suddenly the world as we knew it came to a grinding halt and tottered on the brink of despair. In a…

Hackers Are Selling a Critical Zoom Zero-Day Exploit for $500,000

By Lorenzo Franceschi-Bicchierai , Source: Motherboad, Tech by VICE Hackers are selling two critical vulnerabilities for the video conferencing software Zoom that would allow someone to hack users and spy on their calls, Motherboard has learned. The two flaws are…

Vietnam-linked hackers targeted Chinese government over coronavirus response: researchers

By: Jack Stubbs, Raphael Satter Additional reporting by Muyu Xu in Beijing and James Pearson in Hanoi; Editing by Richard Chang  Source: Reuters LONDON/WASHINGTON (Reuters) - Hackers working in support of the Vietnamese government have attempted to break into Chinese…

Understanding SIM Card Forensics

By: Rohit Shaw Source: eforensicsmag References http://www.forensicmag.com/articles/2011/04/sim-forensics-part-1 http://www.infosecinstitute.com/courses/mobile-computer-forensics.html https://www.visualanalysis.com/ProductsVA_SIMpull.aspx http://csrc.nist.gov/groups/SNS/mobile_security/documents/mobile_forensics/Reference%20Mat-final-a.pdf The SIM (subscriber identity module) is a fundamental component of cellular phones. It’s also known as an integrated circuit card (ICC), which is a microcontroller-based access module. It is a…

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Source: krebsonsecurity The U.S. Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused of perpetrating the 2017 hack against consumer credit bureau Equifax that led to the theft of personal data on nearly…

Zero-day attacks: Protections, best practices and how to implement them

Sources: InfosecInstitute Zero-day (0day) exploit, Imperva Cybersecurity: How to get your software patching strategy right and keep the hackers at bay, ZDNet Five Key Capabilities To Look for in a Managed Web Application Firewall (WAF) Provider, GBHackers on Security  …

Cyberspace Security in Africa – Where Do We Stand?

By Tomslin Samme-Nlar, Researcher Source: circleID Very few African states today have developed a national cybersecurity strategy or have in place cybersecurity and data protection regulations and laws. Yet, the continent has made major headway in developing its digital ecosystem,…