Technology
Cyber Threats in Nigeria Drop 7.5% in 2021—Kaspersky
By Adedapo Adesanya
Cyber threats in Nigeria in 2021 depreciated by 7.5 per cent, according to the latest research by Kaspersky.
This dramatic change in the threat landscape is coming at a time regular and self-propagating malware is decreasing dramatically, as it is no longer effective and cannot fly under security radars.
Security researchers at Kaspersky noticed that Kenya recorded the highest decline with an unprecedented 28.6 per cent, while South Africa saw a 12 per cent decrease.
The reason for such a change was the introduction and popularisation of new cybercrime models in the region, with cybercrime tools becoming more targeted along with a long-running trend where malware creators rely not on the technical advantage of their technologies over security protection, but on the human factor.
The cybersecurity firm noted that this has stimulated the evolution of phishing schemes in 2021. In particular, the region saw a wave of ‘Anomalous’ spyware attacks.
The usual phishing spyware attack begins when attackers infect a victim by sending them an e-mail with a malicious attachment or a link to a compromised website and ends when the spyware is downloaded and activated on the victim’s device.
Having gathered all necessary data, the operator usually ends the operation by attempting to leave the infected system unnoticed. In anomalous attacks, however, the victim’s device becomes not only a source of data but also a tool for spyware distribution.
Having access to the victim’s email server, the malware operators use it to send phishing emails from a legitimate company’s email address. In this case, anomalous spyware attacks an organisation’s server for collecting stolen data from another organisation and sending further phishing emails.
Speaking on this, Maria Garnaeva, Senior Security Researcher at Kaspersky ICS CERT team, “The Anomalous spyware attacks have a huge potential for growth in South Africa, Kenya and Nigeria in 2022, because unlike regular spyware the entry-level for attackers who wish to employ this tactic is significantly lower – since instead of paying for their own infrastructure, they abuse and employ the victims’ resources.
“We see that cheaper attack methods have always been on the rise in the region and cybercriminals quickly pick up on new tactics. Kaspersky, therefore, suggests that in the nearest future, these countries should be prepared for such attacks.”
She explained that the mass scale attacks are not disappearing, but rather transforming with the scheme usually following a style where a user searches for a free version of an extremely popular legitimate spyware and the cybercriminals offer them a fake installer using ‘black SEO technic’ – the abuse of the legitimate search engines, resulting in the offering of the fraudulent websites first.
As a result of software installer execution, a few dozen malware samples are downloaded and installed with the goal of turning the infected devices into a part of the Glupteba botnet.
The whole fake installers campaign and botnet have been extremely active in South Africa in 2021 and continue to evolve, yet it is scarcely researched.
“While the Glupteba botnet seems to be a threat for consumers, we are still researching it and keeping an eye on its behaviour, since some distributed malware resembles APT-related samples like Lazarus APT groups and were recently used in the largest DDoS attack in Russia. It is too early to say it with a high level of confidence, but these factors may suggest that we are now entering the era where APT actors start to use existing malware distribution platforms which makes attribution of such attacks harder and opens a new vector similar to supply chain attacks,” added Ms Garnaeva.
Recommendations from Kaspersky
In order to stay protected from such new cybercrime models and threats, Kaspersky recommends the following:
– Pay close attention to and don’t open any suspicious files or attachments received from unknown sources.
– Do not download and install applications from untrusted sources.
– Do not click on any links received from unknown sources and suspicious online advertisements.
– Create strong passwords and don’t forget to change them regularly.
– Always install updates. Some of them may contain critical security issues fixes.
– Ignore messages asking to disable security systems for office software or antivirus software.
– Use a robust security solution appropriate to your system type and devices, such as Kaspersky Internet Security.
Technology
Expert Reveals Top Cyber Threats Organisations Will Encounter in 2026
By Adedapo Adesanya
Organisations in 2026 face a cybersecurity landscape markedly different from previous years, driven by rapid artificial intelligence adoption, entrenched remote work models, and increasingly interconnected digital systems, with experts warning that these shifts have expanded attack surfaces faster than many security teams can effectively monitor.
According to the World Economic Forum’s Global Cybersecurity Outlook 2026, AI-related vulnerabilities now rank among the most urgent concerns, with 87 per cent of cybersecurity professionals worldwide highlighting them as a top risk.
In a note shared with Business Post, Mr Danny Mitchell, Cybersecurity Writer at Heimdal, said artificial intelligence presents a “category shift” in cyber risk.
“Attackers are manipulating the logic systems that increasingly run critical business processes,” he explained, noting that AI models controlling loan decisions or infrastructure have become high-value targets. Machine learning systems can be poisoned with corrupted training data or manipulated through adversarial inputs, often without immediate detection.
Mr Mitchell also warned that AI-powered phishing and fraud are growing more sophisticated. Deepfake technology and advanced language models now produce convincing emails, voice calls and videos that evade traditional detection.
“The sophistication of modern phishing means organisations can no longer rely solely on employee awareness training,” he said, urging multi-channel verification for sensitive transactions.
Supply chain vulnerabilities remain another major threat. Modern software ecosystems rely on numerous vendors and open-source components, each representing a potential entry point.
“Most organisations lack complete visibility into their software supply chain,” Mr Mitchell said, adding that attackers frequently exploit trusted vendors or update mechanisms to bypass perimeter defences.
Meanwhile, unpatched software vulnerabilities continue to expose organisations to risk, as attackers use automated tools to scan for weaknesses within hours of public disclosure. Legacy systems and critical infrastructure are especially difficult to secure.
Ransomware operations have also evolved, with criminals spending weeks inside networks before launching attacks.
“Modern ransomware operations function like businesses,” Mitchell observed, employing double extortion tactics to maximise pressure on victims.
Mr Mitchell concluded that the common thread across 2026 threats is complexity, noting that organisations need to abandon the idea that they can defend against everything equally, as this approach spreads resources too thin and leaves critical assets exposed.
“You cannot protect what you don’t know exists,” he said, urging organisations to prioritise visibility, map dependencies, and focus resources on the most critical assets.
Technology
NCC Begins Review of National Telecommunications Policy After 26 Years
By Adedapo Adesanya
In a consultation paper released to the public, the commission said it is seeking input from stakeholders, including telecom operators, tech companies, legal experts, and the general public, on proposed revisions designed to reposition Nigeria’s telecommunications framework to match current digital demands. Submissions are expected by March 20, 2026.
The NTP 2000 marked a turning point in Nigeria’s telecom landscape. It replaced the 1998 policy, introducing full liberalisation and a unified regulatory framework under the NCC, and paved the way for the licensing of GSM operators such as MTN, Econet (now Airtel), and Globacom in 2001 and 2002.
Prior to the NTP, the sector was dominated by Nigerian Telecommunications Limited (NITEL), a government-owned monopoly plagued by obsolete equipment, low teledensity, and poor service. At the time, Nigeria had fewer than 400,000 telephone lines for the entire country.
However, the NCC noted that just as the 1998 policy was overtaken by global developments, the 2000 framework has become structurally misaligned with today’s telecom reality, which encompasses broadband, 5G networks, satellite internet, artificial intelligence, and a thriving digital economy worth billions of dollars.
“The rapid pace of technological change and emerging digital services necessitate a comprehensive update to ensure the policy continues to support economic growth while protecting critical infrastructure,” the Commission stated.
The review will target multiple chapters of the policy. Key revisions include: Enhancements on online safety, content moderation, digital services regulation, and improved internet exchange protocols; a modern framework for satellite harmonisation, coexistence with terrestrial networks, and clearer spectrum allocation to boost service quality, and policies to address fiscal support, reduce multiple taxation, and lower operational costs for operators.
The NCC is also proposing entirely new sections to the policy to address emerging priorities. Among the key initiatives are clear broadband objectives aimed at achieving 70 per cent national broadband penetration, with a focus on extending connectivity beyond urban centres to reach rural communities.
The review also seeks to formally recognise telecom infrastructure, including fibre optic cables and network masts, as Critical National Infrastructure to prevent vandalism and enhance security.
In addition, the commission is targeting the harmonisation of Right-of-Way charges across federal, state, and local governments, alongside the introduction of a one-stop permitting process for telecom deployment, designed to reduce bureaucratic delays and lower operational costs for operators.
According to the NCC, the review aims to make fast and affordable internet widely accessible. “The old framework was largely voice-centric. Today, data is the currency of the digital economy,” the commission said, highlighting the need to close the urban-rural broadband divide.
The consultation process is intended to gather diverse perspectives to ensure the updated policy reflects current technological trends, market realities, and consumer needs. By doing so, the NCC hopes to maintain the telecommunications sector’s role as a key driver of economic growth and digital inclusion.
Technology
FG to Scrutinise MTN’s $2.2bn Full Take Over of IHS Towers
By Adedapo Adesanya
The Minister of Communications, Innovation and Digital Economy, Mr Bosun Tijani, says the Nigerian government is assessing MTN Group’s acquisition of IHS Towers to ensure the deal aligns with Nigeria’s telecommunications development goals.
On Tuesday, MTN Group said it has agreed to acquire the remaining 75.3 per cent stake in IHS Holding Limited in an all-cash deal valued at $2.2 billion. The deal will be funded through the rollover of MTN’s existing stake of around 24 per cent in IHS, as well as about $1.1 billion in cash from MTN, roughly $1.1 billion from IHS’s balance sheet, and the rollover of no more than existing IHS debt.
Mr Tijani, in a statement, said the administration of President Bola Tinubu has spent the past two years strengthening the telecom sector through policy clarity, regulatory support, and engagement with industry stakeholders, boosting investor confidence and sector performance.
“Recent financial results from key operators show improved profitability, increased investment in telecoms infrastructure, and operational stability across the sector,” he said.
“These gains reflect the resilience of the industry and the impact of government reforms.”
The minister added that telecommunications infrastructure is critical for national security, economic growth, financial services, innovation, and social inclusion.
“We will undertake a thorough assessment of this development with relevant regulatory authorities to review its impact on the sector,” Mr Tijani said.
He added that the review aims to ensure market consolidation or structural changes, protect consumers, safeguard investments, and preserve the long-term sustainability of the telecom industry.
Mr Tijani also said the government remains committed to maintaining a stable and forward-looking policy environment to keep Nigeria’s telecommunications sector strong and sustainable, in line with the administration’s broader digital economy vision.
Upon completion, the transaction will see MTN transition from being a minority shareholder in IHS to a full owner. It will also see IHS exit from the New York Stock Exchange and become a wholly owned subsidiary of MTN.
For MTN, the deal represents a decisive shift as data demand surges and digital infrastructure becomes increasingly strategic with a booming digitally-oriented youth population on the continent.
-
Feature/OPED6 years agoDavos was Different this year
-
Travel/Tourism10 years ago
Lagos Seals Western Lodge Hotel In Ikorodu
-
Showbiz3 years agoEstranged Lover Releases Videos of Empress Njamah Bathing
-
Banking8 years agoSort Codes of GTBank Branches in Nigeria
-
Economy3 years agoSubsidy Removal: CNG at N130 Per Litre Cheaper Than Petrol—IPMAN
-
Banking3 years agoSort Codes of UBA Branches in Nigeria
-
Banking3 years agoFirst Bank Announces Planned Downtime
-
Sports3 years agoHighest Paid Nigerian Footballer – How Much Do Nigerian Footballers Earn











