Select any text and click on the icon to listen!
ByGSpeech
ADVERTISEMENT
TechEconomy
Friday, May 23, 2025
No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
Podcast

Home » Spyware Dynamics in the African Regions Multidirectional, Enterprises Remain on Alert

Spyware Dynamics in the African Regions Multidirectional, Enterprises Remain on Alert

Techeconomy by Techeconomy
August 27, 2022
in Security
3
Press play to listen to this content
0:00
-:--
1x
Playback Speed
  • 0.5
  • 0.6
  • 0.7
  • 0.8
  • 0.9
  • 1
  • 1.1
  • 1.2
  • 1.3
  • 1.5
  • 2
Spyware Dynamics in the African Regions Multidirectional, Enterprises Remain on Alert. relatedposts. why we introduced ‘honeypot as a service’ – j2 software. may 20, 2025 social media: report shows spike in identity fraud. may 20, 2025 according to kaspersky security network data for corporate users in south africa, in q2 2022 the number of users affected by trojan spies – spyware able to secretly harvest victim’s credentials – decreased compared to the previous quarter. kenya and nigeria saw slight increases in this threat. security operations centers in organisations remain on alert with various cybercriminal groups continuing their activity across regions. spyware is a type of malware that is used to spy on a user’s actions (to track data entered by keyboard, make screen shots, retrieve a list of running applications, etc.). the collected information is then transmitted to the malicious user controlling the spyware through email, the web and other methods. spyware can be installed on any device – desktops or laptops, servers and mobile devices and masked as regular apps for unnoticed operation. spyware is used for espionage – to collect banking card credentials, passwords and other valuable data. in 2021, kaspersky experts identified the pseudomanuscrypt spyware module targeting many industrial and government organisations. it collected vpn connection data, logged keypresses, captured screenshots and videos of the screen, recorded sound with the microphone and stole clipboard data and operating system event log data. industrial espionage was one of the possible objectives of the campaign. other spyware threats monitored by kaspersky experts include such known cases as pegasus, chrysaor, finspy, coolwebsearch, gator. dynamics of users affected by trojan spies in the african regions were multidirectional. in south africa, the number of users affected by trojan spies in q2 decreased by 21% in comparison with q1. in nigeria the number of affected users increased by 12%. in kenya, the number of users affected by spyware remained almost unchanged with a 1% increase. “spyware remains one of the most popular types of malware, enabling corporate espionage or intellectual property theft. it is often used in a targeted manner, with corporate networks getting infiltrated for information collection. it is common that spyware can lead to loss of some corporate data from a device of one of the employees, but it is far more likely that the compromised employee will be used as an entry-point into the corporate network, which contains more information,” comments emad haffar, head of technical experts, meta region at kaspersky. “one of the key characteristics of spyware is evasiveness – a competent security operations center together with advanced cybersecurity solutions are required to mitigate this threat. kaspersky endpoint security for business and kaspersky anti targeted attack work well for organisations to block spyware in corporate systems.”. 2 total views , 1 views today. advertisements author. techeconomy. view all posts. 0shares tags: spyware what is spyware
Powered By GSpeech

RelatedPosts

Business security by John Mc Loughlin, J2 Software CEO | Honeypot as a Service

Why We Introduced ‘Honeypot as a Service’ – J2 Software

May 20, 2025

Social Media: Report Shows Spike in Identity Fraud

May 20, 2025

According to Kaspersky Security Network data for corporate users in South Africa, in Q2 2022 the number of users affected by Trojan Spies – spyware able to secretly harvest victim’s credentials – decreased compared to the previous quarter.

Kenya and Nigeria saw slight increases in this threat. Security operations centers in organisations remain on alert with various cybercriminal groups continuing their activity across regions.

Spyware is a type of malware that is used to spy on a user’s actions (to track data entered by keyboard, make screen shots, retrieve a list of running applications, etc.). 

https://techeconomy.ng/2022/08/8-common-cyber-attacks-you-may-likely-experience/

The collected information is then transmitted to the malicious user controlling the spyware through email, the web and other methods. 

Spyware can be installed on any device – desktops or laptops, servers and mobile devices and masked as regular apps for unnoticed operation. Spyware is used for espionage – to collect banking card credentials, passwords and other valuable data. 

In 2021, Kaspersky experts identified the PseudoManuscrypt spyware module targeting many industrial and government organisations. It collected VPN connection data, logged keypresses, captured screenshots and videos of the screen, recorded sound with the microphone and stole clipboard data and operating system event log data. Industrial espionage was one of the possible objectives of the campaign. Other spyware threats monitored by Kaspersky experts include such known cases as Pegasus, Chrysaor, FinSpy, CoolWebSearch, Gator.

Dynamics of users affected by Trojan Spies in the African regions were multidirectional. In South Africa, the number of users affected by Trojan Spies in Q2 decreased by 21% in comparison with Q1. In Nigeria the number of affected users increased by 12%.

In Kenya, the number of users affected by spyware remained almost unchanged with a 1% increase.

“Spyware remains one of the most popular types of malware, enabling corporate espionage or intellectual property theft. It is often used in a targeted manner, with corporate networks getting infiltrated for information collection. It is common that spyware can lead to loss of some corporate data from a device of one of the employees, but it is far more likely that the compromised employee will be used as an entry-point into the corporate network, which contains more information,” comments Emad Haffar, Head of Technical Experts, META region at Kaspersky. “One of the key characteristics of spyware is evasiveness – a competent Security Operations Center together with advanced cybersecurity solutions are required to mitigate this threat. Kaspersky Endpoint Security for Business and Kaspersky Anti Targeted Attack work well for organisations to block spyware in corporate systems.”

2 total views , 1 views today

Advertisements
MTN ADS

Author

  • Techeconomy
    Techeconomy

    View all posts
0Shares
Tags: SpywareWhat is Spyware
Previous Post

Keep Food Fresh and Maintain a Healthy Lifestyle with LG Refrigerator

Next Post

Why Building a Culture of Cyber Awareness Should Start at the Top

Techeconomy

Techeconomy

Related Posts

Business security by John Mc Loughlin, J2 Software CEO | Honeypot as a Service
Security

Why We Introduced ‘Honeypot as a Service’ – J2 Software

by Destiny Eseaga
May 20, 2025
0

J2 Software has introduced 'Honeypot as a Service', a plug-and-play solution designed to deceive attackers, gather critical threat intelligence, and...

Read more
social media blogging and death of influence | Identity theft

Social Media: Report Shows Spike in Identity Fraud

May 20, 2025
Ikot Ekpene Declaration

Ikot Ekpene Declaration: Nigerian Judges Commit to Upholding Global Digital Rights Standards

May 20, 2025
Invinsense by Infopercept: Cybersecurity Offering Tailored for Fintechs

Mart Networks Unveils Comprehensive Cybersecurity Offering Tailored for Fintechs

May 19, 2025
Scattered Spider Behind UK Retail Attacks Now Eyeing U.S. Targets — Google Warns

Hackers Behind UK Retail Attacks Now Eyeing U.S. Targets — Google Warns

May 15, 2025
Sophos MSP Elevate

Sophos Accelerates Business Growth and Profitability for MSPs with the Launch of MSP Elevate Program

May 15, 2025
Next Post

Why Building a Culture of Cyber Awareness Should Start at the Top

Comments 3

  1. Pingback: Spyware Dynamics in the African Regions Multidirectional, Enterprises Remain on Alert | Digital Brainiacs | Tech News Aggregator in Africa | Mobile Apps | Free Software Downloads | Free Wordpress Downloads
  2. Pingback: Five Ways to Protect Your Organisation from Spyware – TechEconomy.ng - TechEconomy.ng - ABHI BEE
  3. Pingback: Spyware Dynamics in the African Regions Multidirectional, Enterprises Remain on Alert – TechEconomy.ng - TechEconomy.ng - Tricky News

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Techeconomy Podcast

Techeconomy Podcast
Techeconomy Podcast

Infowave is brought to you by TechEconomy. Every week we will bring new stories from startups and influencers who are shaping and changing the world we live in. We’ll also bring you reports on topics you should know.

Follow us @techeconomyng for more.

Audio Player
TECH TALK EPISODE 2
Techeconomy Podcast
TECH TALK EPISODE 2
PRODUCTIVITY AND WORK-Life Balance[...]
  • 0.8
  • 1
  • 1.2
  • 1.5
  • 2
Download
  • Facebook
  • Twitter
  • Linkedin
  • Copy episode link Copied
  • Download
Captions
00:00
00:00
TECH TALK EPISODE 2
byTecheconomy

PRODUCTIVITY AND WORK-Life Balance

TECH TALK EPISODE 2
May 22, 2025
Techeconomy
CYBERSECURITY ESSENTIALS
April 24, 2025
Techeconomy
Digital Marketing Trends and strategies for 2025 and beyond
February 27, 2025
Techeconomy
Major Lesson for Techies in 2024 and Projections for 2025
December 6, 2024
Techeconomy
Major Lessons for Techies in an AI-Driven World | Techeconomy Business Series Highlights
November 26, 2024
Techeconomy
Maximizing Profitability Through Seasonal Sales: Strategies For Success
November 8, 2024
Techeconomy
Techeconomy Business Series
October 15, 2024
Techeconomy
PRIVACY IN THE ERA OF AI: GETTING YOUR BUSINESS READY
May 30, 2024
Techeconomy
Unravel the Secrets of Marketing Everywhere All At Once with Isaac Akanni from Infobip | Infowave Podcast Episode 1
February 9, 2024
Techeconomy
The Role of Ed-tech in Life Long Learning and Continuous Education
October 19, 2023
Techeconomy
Search Results placeholder

WHAT IS TRENDING

Video Player
https://www.youtube.com/watch?v=g_MCUwS2woc&list=PL6bbK-xx1KbIgX-IzYdqISXq1pUsuA4dz
00:00
00:00
00:31
Use Up/Down Arrow keys to increase or decrease volume.

Follow Us

  • About Us
  • Contact Us
  • Careers
  • Privacy Policy

© 2025 Techeconomy - Designed by Opimedia.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS

© 2025 Techeconomy - Designed by Opimedia.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Press play to listen to this content
Spyware Dynamics in the African Regions Multidirectional, Enterprises Remain on Alert. relatedposts. why we introduced ‘honeypot as a service’ – j2 software. may 20, 2025 social media: report shows spike in identity fraud. may 20, 2025 according to kaspersky security network data for corporate users in south africa, in q2 2022 the number of users affected by trojan spies – spyware able to secretly harvest victim’s credentials – decreased compared to the previous quarter. kenya and nigeria saw slight increases in this threat. security operations centers in organisations remain on alert with various cybercriminal groups continuing their activity across regions. spyware is a type of malware that is used to spy on a user’s actions (to track data entered by keyboard, make screen shots, retrieve a list of running applications, etc.). the collected information is then transmitted to the malicious user controlling the spyware through email, the web and other methods. spyware can be installed on any device – desktops or laptops, servers and mobile devices and masked as regular apps for unnoticed operation. spyware is used for espionage – to collect banking card credentials, passwords and other valuable data. in 2021, kaspersky experts identified the pseudomanuscrypt spyware module targeting many industrial and government organisations. it collected vpn connection data, logged keypresses, captured screenshots and videos of the screen, recorded sound with the microphone and stole clipboard data and operating system event log data. industrial espionage was one of the possible objectives of the campaign. other spyware threats monitored by kaspersky experts include such known cases as pegasus, chrysaor, finspy, coolwebsearch, gator. dynamics of users affected by trojan spies in the african regions were multidirectional. in south africa, the number of users affected by trojan spies in q2 decreased by 21% in comparison with q1. in nigeria the number of affected users increased by 12%. in kenya, the number of users affected by spyware remained almost unchanged with a 1% increase. “spyware remains one of the most popular types of malware, enabling corporate espionage or intellectual property theft. it is often used in a targeted manner, with corporate networks getting infiltrated for information collection. it is common that spyware can lead to loss of some corporate data from a device of one of the employees, but it is far more likely that the compromised employee will be used as an entry-point into the corporate network, which contains more information,” comments emad haffar, head of technical experts, meta region at kaspersky. “one of the key characteristics of spyware is evasiveness – a competent security operations center together with advanced cybersecurity solutions are required to mitigate this threat. kaspersky endpoint security for business and kaspersky anti targeted attack work well for organisations to block spyware in corporate systems.”. 2 total views , 1 views today. advertisements author. techeconomy. view all posts. 0shares tags: spyware what is spyware
Read content
audio content is empty.
Read content
Options
0:00
-:--
1x
Playback Speed
  • 0.5
  • 0.6
  • 0.7
  • 0.8
  • 0.9
  • 1
  • 1.1
  • 1.2
  • 1.3
  • 1.5
  • 2
By GSpeech
audio content is empty.
Select and listen