ESET East Africa Blog ESET East Africa Blog
ESET East Africa Blog ESET East Africa
ESET East Africa Blog ESET East Africa Blog
  • Cyber Security
    • Cyber Security
      • Fake Security App
        Beware: ad slingers thinly disguised as security apps
      • Meltdown and Spectre
      • Security trends to look out for in 2018
      • safe online shopping
        ESET’s top 5 tips for safe online shopping this festive season
      • Breached site notifications tested by Firefox
    • Cyber Crime
      • Meltdown and Spectre
      • Phishing email
        Black Friday Cyber Monday – Stop … Look … Think!
      • Windows Movie Maker scam spreads due to high ranking
      • ESET research team assists FBI in Windigo case
      • Fake cryptocurreny trading apps
    • Ransomware
      • Security trends to look out for in 2018
      • africans-worried-petya
        Why Africans should be worried about PETYA
      • Understanding Wannacryptor
        WannaCryptor: What you need to know about the ransomware
      • Ransomware Android Phone
        Ransomware: Cause for Alarm for Android Phone Users
      • Ransomware ESET East Africa
        Ransomware the next big threat to data
  • Research
    • Research Posts
      • ESET research team assists FBI in Windigo case
      • ESET solution praised for low system impact by AV-Comparatives
      • Win32-Industroyer
        Win32/Industroyer: A new threat for industrial control systems
      • ESET Trends 2017 in Android Ransomware
        ESET Trends 2017 in Android Ransomware
      • ESET Trends 2017 – Security Held Ransom
        ESET Trends 2017 – Security Held Ransom
      • Windows 10 security and privacy
        Windows 10 security and privacy: An in-depth review and analysis
  • Technology
    • Android
      • Fake Security App
        Beware: ad slingers thinly disguised as security apps
      • Malware alert for Android
        Malware alert for Android phone users
      • Ransomware Android Phone
        Ransomware: Cause for Alarm for Android Phone Users
      • New parental control app
        New parental control app monitors children’s online activities
    • Linux
      • ESET research team assists FBI in Windigo case
      • Serious Linux vulnerabilities
        The importance of patch management after serious Linux vulnerabilities
    • Windows
      • ESET Chrome Cleanup
        ESET and Google combine to improve Chrome
      • Understanding Wannacryptor
        WannaCryptor: What you need to know about the ransomware
  • Video
    • Video Posts
      • VideoCyber Crime Prevention
        What you need to know for Cyber Crime Prevention
      • Alistair Freeman Interview On EBRU TV
        Alistair Freeman Interview On EBRU TV
      • How to make a strong password
        How to make a strong password
      • Poor cybersecurity costs Kenyan companies billions in losses yearly
        Poor cybersecurity costs Kenyan companies billions in losses yearly
      • What is encryption
        What is encryption and how does it work?
      • What is cyberbullying
        What is cyberbullying and how to defend against it?
  • Opinion
    • Opinion Posts
      • Why Parents need to defend their homes against the deep waters of the Internet
      • Ransomware ESET East Africa
        Ransomware the next big threat to data
  • Featured
    • Featured Posts
      • Convergence Partners acquires Stake in ESET East Africa
      • ESET solution praised for low system impact by AV-Comparatives
      • ESET receives Bronze Award in the 2017 Gartner Peer Insights Customer Choice Awards for Endpoint Protection Platforms
      • Teddy-Njoroge-ESET-Country-Manager-Kenya
        Teddy Njoroge on building the brand and revenues for ESET in East Africa
      • Free online cybersecurity training
        Free online cybersecurity training for businesses in Kenya
      • cybersecurity breach reporting
        Calls for standardized cybersecurity breach reporting
  • ESET
    • Main ESET Website
    • About ESET
    • Contacts
    • ESET Store
    • Virus Radar
  • ESET Main Website
  • ESET Store
  • Virus Radar
  • About ESET
  • Contacts

Latest Stories

Fake Security App

Beware: ad slingers thinly disguised as security apps

Mobile World Congress: Introducing 5G

Smart, Smarter… Dumbest…

Social Connect

Linux

ESET East Africa Blog > All Articles > Technology > Linux
Cyber Crime, Cyber Security, Linux, Malware, Research, Technology

ESET research team assists FBI in Windigo case 0 334

Bethany Hill2017-10-30 3:34 pm2017-11-01

First detected in 2011, the malware campaign that later became known as Windigo was able to infiltrate around 25,000 servers over …

Serious Linux vulnerabilities
Cyber Security, Linux

The importance of patch management after serious Linux vulnerabilities 0 222

Teddy Njoroge2016-11-30 3:30 pm2017-09-15

In recent news there have been a number of serious vulnerabilities found in various Linux systems. Whilst OS vulnerabilities are …

Receive Latest Posts Weekly

Most Popular Right Now

1

Five Things About the ESET Partner Programme You May Not Have Known 3508

2

ICT ministers reiterate need for Africa to be involved in cyber security 512

3

The role of Kenyan Legal Professionals in Cybersecurity 458

4

ESET’s top 5 tips for safe online shopping this festive season 446

5

Black Friday Cyber Monday – Stop … Look … Think! 434

Recent Posts

  • Beware: ad slingers thinly disguised as security apps
  • Mobile World Congress: Introducing 5G
  • Smart, Smarter… Dumbest…
  • ESET named as the only Challenger in 2018 Gartner Magic Quadrant for Endpoint Protection Platforms
  • ESET’s guide makes it possible to peek into FinFisher

Archives

  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • December 2016
  • November 2016
  • October 2016
  • July 2016
  • June 2016
  • March 2016
  • February 2016
  • December 2015

Categories

  • Android
  • Antivirus
  • Apps
  • Cyber Bullying
  • Cyber Crime
  • Cyber Security
  • DDoS
  • Featured
  • Hacking
  • IOT
  • Linux
  • Malware
  • Opinion
  • Partner Programme
  • Ransomware
  • Research
  • Security Tips
  • Social Media
  • Technology
  • Uncategorized
  • Video
  • White Papers
  • Windows
ESET Africa Blog

Choose Topic

  • All Articles
  • Cyber Security
  • Cyber Bullying
  • Ransomware
  • Hacking
  • DDoS
  • Security Tips
  • Partner Programme

Most Discussed

1

Beware: ad slingers thinly disguised as security apps 0

2

USB drives with built in antivirus launched 0

3

The Rise of Android Ransomware 0

Popular

ESET Partner Programme

Five Things About the ESET Partner Programme You May Not Have Known

ICT ministers reiterate need for Africa to be actively involved in cyber-security, cybercrime

ICT ministers reiterate need for Africa to be involved in cyber security

Kenya cybercriminal activity

The role of Kenyan Legal Professionals in Cybersecurity

Partner with ESET

ESET Africa Blog
ESET Kenya Blog
  • CONTACT
  • PRIVACY
  • LEGAL INFORMATION
  • REPORT VULNERABILITIES

© 1992 - 2017 ESET, spol. s r.o. - All rights reserved. Trademarks used therein are trademarks or registered trademarks of ESET, spol. s r.o. or ESET North America. All other names and brands are registered trademarks of their respective companies.

Menu
  • ESET East Africa Blog
  • Catagories
    • Cyber Security
      • Cyber Bullying
      • Privacy
      • DDoS
      • Malware
      • Cyber Crime
    • Research
      • White Papers
    • Technology
    • Video
  • About Us
  • Contacts
Contact Info
Unit 2, The Mirage, Chiromo Road, Westlands, Nairobi
+254 205 137 023 +27 21 659 2000
sales@esetafrica.com

Most Popular Topics

ESET East Africa Blog
Cyber Security
ESET East Africa Blog
Cyber Crime
ESET East Africa Blog
Ransomware
ESET East Africa Blog
Antivirus

ESET Picks

1

Why Financial Institutions are being hit hard by Cyber Criminals

2

Why Africans should be worried about PETYA

3

How to make a strong password

4

WannaCryptor: What you need to know about the ransomware

5

Why Kenyans should take cyber security seriously