May 24, 2023
6x14-0000-LBN.jpg

2min

 



 

 

Vengadasalam Balagobi is the Director – Cyber Security and Privacy of PricewaterhouseCoopers Sri Lanka was unanimously elected as the President of the Mercantile Hockey Association (MHA) at the 67th Annual General Meeting, held on 31st March, at the Red Wood Lounge of Burgers Recreation Club (BRC).

Balagobi, Vice Presitent cum Treasurer (2022 /23) was the MHA Interim President, since the passing away of the President, Asif Bari (while in office) on 09th September 2022.

ChandanaWeragama from Sampath Bank PLC was retained as the Secretary & Sameera Ushantha also from Sampath Bank PLC took over as the new Treasurer.

The list of Office Bearers for the period 2023 /24 (all unanimously elected)

President – V. Balagobi / PricewaterhouseCoopers

Vice Presidents (05) : J. Majid / ExpoceylonPharmaceuticals; Christopher Tissera/ SRB Logistics Ceylon (Pvt) Ltd; Ajith de Silva /Brown & Co. PLC; Kumar de Silva /SRB Logistics Ceylon (Pvt) Ltd;  & Sumith Jayasena / Commercial Bank of Ceylon PLC.

Secretary : Chandana Weragama/ Sampath Bank PLC

Asst. Secretary : Mohamed Hanas / Singer Sri Lanka PLC

Treasurer : Sameera Ushantha / Sampath Bank PLC.

Asst. Treasurer – Deepika Kariyawasam / Heyleys Group

Executive Committee (08) – J. Irshad / Seylan Bank PLC;  ChamindaSuduarachchi HNB; Sheron Fabian /John Keells Group ; Gihan Peiris / Allianz Insurance Lanka Ltd., Laknath Guruge/ Singer Sri Lanka PLC; Vishwa Prabath /Browns & Co. PLC;  Sachith Dilshan / Airport & Aviation Services &SahidKuthubdeen / MAS Holdings

 



 

 


December 20, 2022
02-LBN.jpg

3min

 



 

 

Oak Integrated Systems (Pvt) Ltd. recently held a forum under the theme ‘Build Cyber Security & Resilience together with Oak’. The highlight of the event was a discussion with the distinguished panel which included Mr. Dilan Walgampaya, Cyber Security Consultant, Mr. Deenadayalan Nagaratnam, Cyber Security Consultant, Mr. Janindu de Silva, Vice President, Information Security – Nations Trust Bank, and Mr. Asela Waidyalankara, Cyber Security Advocate. The discussion was moderated by Mr. Nirodha Goonawardena, Head of Solution Sales at Oak Integrated Systems (Pvt) Ltd. The panelists were distinguished members of the industry and vastly experienced in cyber security, banking & finance, and large corporate operations.

The key focus of the panel discussion was ‘Meeting the guidelines of the Central Bank of Sri Lanka (CBSL) Banking Act 2021, which is a set of guidelines for the banking and finance sector.

The discussion mainly focused on finding solutions to help incorporate and fulfill these guidelines. Furthermore, building Cyber Security and Resilience in the Banking, Financial Services, and Insurance (BFSI) organizations were also addressed. The panelists also touched on the importance of data protection and cyber security within the industry.

A rapid increase of Cyber threats was witnessed in the recent past, and it is imperative that appropriate measures are taken to protect and mitigate and remediate them. Therefore, it is very important that IT security budgets are allocated to help protect businesses and customer information from these threats, especially within the Banking and Financial sector.

Mayura Senevirathne, Head of Business at Oak Integrated Systems, shared his thoughts, “As a systems integrator, we have a heavy focus on cyber security. We look forward to working with the Banking and Finance sector to build cyber security and resilience. We carry a variety of globally reputed brands coupled with the best of local references, which we utilize to provide our customers with the best solutions available.”

Oak Integrated Systems (Pvt) Ltd. was established with the strength of its people, integrity of its management, and with a stable financial background. It is a well reputed company in the industry that has continuously provided innovative services to industry leaders in Sri Lanka.

 



 

 

 


July 21, 2022
6ffac2e643cd1b0fac8fa55536fe32e2.jpg

6min

 



 

 

 

With this Fusion Centre, Liquid aims to bolster the cyber security industry in the country by managing the growing threat of cyberattacks to governments and enterprises of all sizes

JOHANNESBURG, South Africa, July 20, 2022/APO Group/ — Liquid Cyber Security, a business of Cassava Technologies, today launched the first of its matrix of Cyber Security Fusion Centres in Johannesburg, South Africa. With this Fusion Centre, Liquid aims to bolster the cyber security industry in the country by managing the growing threat of cyberattacks to governments and enterprises of all sizes.

For the first time, African businesses and governments will have access to Liquid’s matrix of Security Fusion Centres across key markets. These centres will provide threat intelligence and bring together the existing Liquid Cloud Operations and Liquid Network Operation Centres, ensuring customers have full support across cyber security, cloud and networks for end-to-end security.

The Centre will eliminate silos and enhance threat visibility leading to deeper collaboration across teams and increased cyber resiliency. Through the combined offering of the security advisory, managed service, and integrated cyber intelligence, enterprises will now be able to stay ahead of cyber-attacks.

There has been a rapid acceleration in the adoption of digital technologies globally, and South Africa is no different. However, the nature of work and how businesses operate constantly evolves, and so has the scale of cyber threats. In fact, according to an Interpol report, South Africa had 230 million threats detected in 2021, highlighting a dark side to this rapid digital transformation. Malicious actors have more avenues for attacking businesses through brute force or human error.

The launch of this Cyber Security Fusion Centre is a testament to the organisation’s investment in the country to bring world-class services to local businesses

“Our pan-African Cyber Security Fusion Centres will, when fully operational, leverage our ability to track and predict threats across the continent and will be enhanced by the capability of our international partners like Microsoft, ITC Secure and Xcitium,” said David Behr, CEO of Liquid Cloud and Cyber Security. “The alarming rate of cyberattacks led us to launch Liquid Cyber Security in 2020, and today we are elevating the offering for our customers by launching the first Fusion Centre. As a result, we will ensure our South African customers have access to world-leading cyber security services, enabling them to mitigate potential threats timeously. Most importantly, customers can focus on their critical business needs while we manage their cyber security requirements 24/7/365 with the most cost-efficient and effective approach”.

Following a phased approach, South African enterprises will benefit from new services that leverage Microsoft Defender and Microsoft Sentinel – all delivered and monitored 24x7x365. In addition, Liquid Cyber Security has partnered with Xcitium (previously Comodo Security Solutions) to offer solutions designed explicitly for small and medium businesses requiring Security Operation Centre (SOC) services without investing in highly skilled resources or Enterprise SOC services they cannot afford.

With this Fusion Centre, Liquid aims to respond to threats with a strategic, tactical, technical and operational threat intelligence approach, enabling the teams to make informed decisions while mitigating the threat for customers. The launch of this Cyber Security Fusion Centre is a testament to the organisation’s investment in the country to bring world-class services to local businesses.

“One of the most significant advantages of the Liquid Cyber Security Fusion Centre is the improvement in the time it would take for the organisation to detect and respond to threats faster and smarter. As a result, Liquid can now assist its customers in real-time and enable them to be proactive rather than reactive, as well as effectively handle the situation, especially in today’s complex threat landscape,” concluded Behr.

Distributed by APO Group on behalf of Liquid Intelligent Technologies.










May 11, 2022
202645.jpg

4min

 



 

 

 

The additional capacity will help increase the proliferation of faster and more affordable internet, Cloud and cyber security services to the African people and businesses

NAIROBI, Kenya, May 11, 2022/APO Group/ —

Liquid Intelligent Technologies (https://www.Liquid.Tech/), a business of Cassava Technologies, has partnered with PEACE Cable Company to introduce 800Gbps of additional subsea capacity in Mombasa on the highly-anticipated global submarine cable. This will increase the availability of high-performance and reliable Internet connectivity access across Africa, leveraging Liquid’s 100,000km of terrestrial fibre across 12 countries. While acting as a new global internet route between Asia, Europe and the USA, the additional capacity will help increase the proliferation of faster and more affordable internet, Cloud and cyber security services to the African people and businesses.

Liquid Dataport (a division of Liquid Intelligent Technologies) CEO David Eurin said, “We are delighted to provide new subsea capacity between Mombasa, Karachi and Marseille, with extensions planned towards Singapore and Asia. This creates a cost-effective, low-latency and diverse route that our customers can leverage to serve their business-critical connectivity needs. The submarine cable will be ready in 2022.”

Liquid already has access to many subsea cables around Africa like Equiano, WACS, SAT3/SAFE, EASSy, TEAMS, SEACOM and later 2Africa. With the new PEACE cable, the continent will benefit from much-needed additional capacity from the East Coast of Africa to Europe. Additionally, it will add diversity to an important route, allowing for improved redundancy and low latency (102ms between Mombasa and Marseille).

“We see around a 40-50% growth in internet traffic every year, so we invest massively in subsea cables to provide the best Internet experience across all countries in Africa,” explained Eurin. “We have been working closely with PEACE to extend the subsea capacity to more landlocked countries (including Uganda, Rwanda, South Sudan, Ethiopia, Burundi and the north-east of DRC). This is critical for our customers to leverage higher bandwidth, and it is expected to make the internet faster and more affordable in the region”.

Liquid’s 100,000 km terrestrial fibre backbone was a major point of interest in the partnership with PEACE. Through its extensive network, Liquid will extend this new capacity to many destinations, including access to other subsea cable landing stations, such as Luanda in Angola, Muanda in the Democratic Republic of Congo, and Pointe Noire in Congo. This has led to the first protected, reliable, and high-capacity route between the two coasts of the continent, enabling a new global internet route between Asia and the USA (via Africa).

“Connecting Africa to the rest of the world and unleashing its young and dynamic workforce potential may be the key to catapulting Africa’s international trade and economies to a whole new level. The PEACE deal is another crucial step on that journey,” concluded Eurin.

 



 

 

 


March 30, 2022
Capture-1.jpg

4min

 



 

 

 

Mountain Lion Ventures, a Sri Lanka tech sector focussed investment vehicle, has taken a strategic stake in Infragist, which is a cutting-edge technology services company with its design thinking capabilities spreading across Metaverse, Cyber Security, Blockchain, Machine Learning and AI Solutions apart from its full stack tech services offering.

The company was founded by Mubeen Gani, Viraj Adhihetty and Mafahir Fairoze. Speaking about the services they offer Mubeen Gani, the Chief Marketing Officer said, “Merging design thinking with appropriate tech solutions has been the forte of the core Infragist team, this approach gives our clients an idea of future with current context in mind and also reduces long term development costs, improves processes and more importantly make them more efficient. This is important given the past paced nature of technology evolution.”

Speaking about the investment Love Yadav, General Partner, Mountain Lion Ventures said, “Sri Lanka has a pool of talent and creativity at par with global standards, Mountain Lion Ventures is here to allow start-ups in Sri Lanka to scale locally and give them international exposure. We are enabling multiple local startups that are scalable and globally transportable. We are excited about our investment in Infragist, as we see potential in their capabilities. Our portfolio companies benefit from our global reach with our presence spanning South America to Asia through its Swiss parent Mountain Partners which has more than 400 global tech investments.”

Viraj Adhihetty the Chief Creative Officer, speaking on the services offered said, “We offer clients a cross-section of services from integrated solutions to cyber-security and business design. Our work drives results and gets brands to exactly where they intended to be in today’s world of technology. The services we offer include User Experience and Customer Experience Design, Creative Content, Solutions Engineering, Integrated Solutions, IoT, Blockchain and Cyber- security. Infragist is an integrated solutions provider that combines design thinking and a human-centric approach with unrestrained creativity, next-gen technology, and performance-driven branding, all under one roof. We are excited about our partnership with Mountain Lion Ventures as it will allow us to reach a wider audience.”

Mafahir Firoze, the Chief Technology Officer, added “the technology services market is evolving constantly and to create long-term value, we are productising some of our key skills into new age solutions especially in digital healthcare and marine logistics, and we are proud to say these are conceptualised and built in Sri Lanka from the ground-up.”

Infragist has its development centre in Sri Lanka, with an operations office in Dubai. The creativity and technology dynamic provided by Infragist will enable its customer to contribute greatly to their constant exposure to online content, helping businesses to keep up to date with their competition, research the needs of consumers, and re-imagine content to suit their needs. For more information on Infragist log on to www.infragist.com or email them at info@infragist.com.

 



 

 

 


March 24, 2022
Michael-Joseph-Director-System-Engineering-India-SAARC-Fortinet.jpg

9min

 



 

 

 

Sophistication, Speed, and Diversity of Attack Techniques Demonstrates Importance of Strengthening Entire Cyber Kill Chain

 Fortinet, a global leader in broad, integrated, and automated cybersecurity solutions, recently announced the latest semiannual FortiGuard Labs Global Threat Landscape Report.

This latest Global Threat Landscape Report is a view representing the collective intelligence of FortiGuard Labs, drawn from Fortinet’s vast array of sensors collecting billions of threat events observed around the world during the second half of 2021. Similar to how the MITRE ATT&CK framework classifies adversary tactics and techniques, with the first three groupings spanning reconnaissance, resource development, and initial access, the FortiGuard Labs Global Threat Landscape Report leverages this model to describe how threat actors find vulnerabilities, build malicious infrastructure, and exploit their targets. The report also covers global and regional perspectives as well.

Commenting on this report, Michael Joseph, Director System Engineering, India & SAARC, Fortinet said, “Cybersecurity is a fast-moving and dynamic industry, but recent threat events show unparalleled speeds at which cyber adversaries are developing and executing attacks today. New and evolving attack techniques span the entire kill chain but especially in the weaponization phase, showing an evolution to a more advanced persistent cybercrime strategy that is more destructive and unpredictable. To protect against this broad scope of threats, organizations need to implement AI-powered prevention, detection, and response strategies based on a cybersecurity mesh architecture allowing for much tighter integration, increased automation, as well as a more rapid, coordinated, and effective response to threats across the extended network.”

Threat intelligence from the second half of 2021 reveals an increase in the automation and speed of attacks demonstrating more advanced persistent cybercrime strategies that are more destructive and unpredictable. In addition, the expanding attack surface of hybrid workers and hybrid IT is a focal point that cyber adversaries are attempting to exploit.

Log4j Demonstrates Dramatic Speed of Exploit Organizations Face: The Log4j vulnerabilities that occurred in late 2021 demonstrate the rapidly increasing speed of exploit that cybercriminals are attempting to leverage to their advantage. Despite emerging in the second week of December, exploitation activity escalated quickly enough, in less than a month, to make it the most prevalent IPS detection of the entire second half of 2021. In addition, Log4j had nearly 50x the activity volume in comparison to the well-known outbreak, ProxyLogon, that happened earlier in 2021. The reality is that organizations have very little time to react or patch today given the speeds that cyber adversaries are employing to maximize fresh opportunities. Organizations need AI and ML-powered intrusion prevention systems (IPS), aggressive patch management strategies, and the threat intelligence visibility to prioritize those threats propagating most quickly in the wild to reduce overall risk.

Adversaries Rapidly Targeting New Vectors Across the Attack Surface: Some lesser or low-lying threats have the potential to cause bigger problems in the future and are worthy of watching. An example is newly crafted malware designed to exploit Linux systems, often in the form of executable and linkable format (ELF) binaries. Linux runs the back-end systems of many networks and container-based solutions for IoT devices and mission-critical applications, and it is becoming a more popular target for attackers.

Botnet Trends Show a More Sophisticated Evolution of Attack Methods: Threat trends demonstrate that botnets are evolving to adopt newer and more evolved cybercriminal attack techniques. Instead of being primarily monolithic and focused mostly on DDoS attacks, botnets are now multipurpose attack vehicles leveraging a variety of more sophisticated attack techniques, including ransomware.

 Malware Trends Show Cybercriminals Maximizing “Remote Everything:” Evaluating the prevalence of malware variants by region reveals a sustained interest by cyber adversaries in maximizing the remote work and learning attack vector. In particular, various forms of browser-based malware were prevalent. This often takes the form of phishing lures or scripts that inject code or redirect users to malicious sites.

Ransomware Activity Still High and Continues to Get More Destructive: FortiGuard Labs data reveals that ransomware has not subsided from peak levels over the last year and instead, the sophistication, aggressiveness, and impact of ransomware is increasing. Threat actors continue to attack organizations with a variety of new as well as previously seen ransomware strains, often leaving a trail of destruction. Old ransomware is being actively updated and enhanced, sometimes with wiper malware included, while other ransomware is evolving to adopt Ransomware-as-as-Service (RaaS) business models..

Deeper Understanding of Attack Techniques Can Help Stop Criminals Faster: Analyzing the attack goals of adversaries is important to be able to better align defenses against the speed of changing attack techniques. To observe the malicious outcomes of various attacks, FortiGuard Labs analyzed the functionality of detected malware by detonating the malware samples collected throughout the year. The result was a list of the individual tactics, techniques and procedures (TTPs) the malware would have accomplished if the attack payloads had been executed.

 Protecting Against Fast-moving and Sophisticated Cyber Adversaries

As attacks continue to develop in sophistication and span the entire attack surface at increased speeds, organizations need solutions designed to interoperate rather than function in isolation. Securing against evolving attack techniques will require smarter solutions that know how to ingest real-time threat intelligence, detect threat patterns and fingerprints, correlate massive amounts of data to detect anomalies, and automatically initiate a coordinated response. Point products need to be replaced with a cybersecurity mesh platform that provides centralized management, automation and integrated solutions that work in concert.

 



 

 

 


December 11, 2021
Sophos.jpg

3min

 



 

 

Colombo, Sri Lanka – 02 December 3, 2021: Fueled by cryptocurrencies, ransomware was involved in 79 per cent of the global cybersecurity incidents in the last 18 months of pandemic, led by Conti and REvil ransomware attacks, a new report by Sophos, a worldwide leader in next-generation cybersecurity.

Cryptocurrency will continue to fuel cybercrimes such as ransomware and malicious cryptomining, and the trend will continue until global cryptocurrencies are better regulated, according to Sophos researchers.

Over the coming year, the ransomware landscape will become both more modular and uniform, with attack “specialists” offering different elements of an attack “as-a-service” and providing playbooks with tools and techniques that enable different adversary groups to implement very similar attacks.

Some of the most high-profile ransomware attacks of the year involved ransomware-as-a-service (RaaS), including an attack against Colonial Pipeline in the US by a ‘DarkSide’ affiliate.

An affiliate of Conti ransomware leaked the implementation guide provided by the operators, revealing the step-by-step tools and techniques that attackers could use to deploy the ransomware.

“Ransomware thrives because of its ability to adapt and innovate,” said Chester Wisniewski, principal research scientist at Sophos.

“In 2021, RaaS developers are investing their time and energy in creating sophisticated code and determining how best to extract the largest payments from victims, insurance companies, and negotiators,” Wisniewski said in a statement.

During 2021, Sophos researchers uncovered cryptominers such as Lemon Duck and the less common, MrbMiner, taking advantage of the access provided by newly-reported vulnerabilities and targets already breached by ransomware operators to install cryptominers on computers and servers.

The use of multiple forms of extortion by ransomware attackers to pressure victims into paying the ransom is expected to continue and increase in range and intensity, the report noted.

“It is no longer enough for organisations to assume they’re safe by simply monitoring security tools and ensuring they are detecting malicious code,” said Wisniewski

 



 

 


September 1, 2021
174318-1-1.jpg

5min

 




The study established some of the main concerns about Cyber Security threats and the most significant impacts of digital breaches on an organisational level

JOHANNESBURG, South Africa, September 1, 2021/ — Over 90% of IT decision makers across South Africa, Kenya and Zimbabwe have accelerated their Cyber Security due to the substantial emergence of digital ways of working. This according to the latest 2021 research undertaken by leading pan-African technology group Liquid Intelligent Technologies (www.Liquid.Tech).

The study established some of the main concerns about Cyber Security threats and the most significant impacts of digital breaches on an organisational level. A critical insight from the research suggests that 79% of businesses from all three countries attribute an increase in Cyber Security threats to the advent of remote working. Data breaches like data extortion, data leakage and data disclosure constitute almost 71% of the cyber-attacks for Kenyan businesses, and over 70% of South African and Zimbabwean organisations consider email attacks like Phishing the most prominent digital threats.

The participants from the research also indicated an increased consumption of Cloud-based services this year, with the numbers being as high as 96% in South Africa, 95% in Kenya and 75% in Zimbabwe. This comes from a jump in Microsoft Office 365, Teams, Zoom, Google Workspace, Microsoft Azure, and Amazon Web Services.

Consequentially, Cyber Security threats and concerns seem to be spiralling up as the workforce continues to shift to working through digital platforms. According to the research, managing user access to information, data loss and recovery, visibility and control of data, and compliance challenges remain some of the biggest concerns for organisations. Almost 80% of organisations that participated in this research from Zimbabwe, South Africa and Kenya agree that Cyber Security threats have increased over the past year.

When segmented by respondents working specifically in large enterprises, the research permitted a more informed audience and knowledgeable opinions. According to the study, an emerging trend for 2021 is that 53% of the respondents emphasise security and data protection as significant concerns. Some of the biggest security concerns cited by businesses using Cloud services are managing user access to information, data loss, recovery and lack of security controls made available by Cloud providers. The research also pointed out Email attacks, Web-based attacks, Social Engineering, Malware, Ransomware and Data Breaches to be the top concerns around Cyber Security in 2021.

Ignus de Villiers, Group Head of Cyber Security, Liquid Intelligent Technologies, says, “The result of our research confirms that Cyber Security should be at the centre of every business conversation and emphasises the need to establish an appropriate Cyber Security Framework that matches the business environment. Critically, the framework must look beyond technical security controls to include information security management covering governance, risk, compliance, people, processes and technology”.

The 2021 research from Liquid takes a deep dive into the current and emerging trends for Cyber Security to help businesses understand the dynamic nature of the Cyber Security threat landscape. Liquid aims to highlight the importance of investing in Cyber Security controls and take a microscopic look at the current trends that navigate this complex field, thereby allowing its clients, consumers, and partners to adjust their existing security infrastructure to be well prepared for the future.

For an in-depth analysis and assessment of Cyber Security trends, read the full report here (https://bit.ly/3Bqx4qU)

Distributed by APO Group on behalf of Liquid Intelligent Technologies.

 

 

 



 

 

 


May 26, 2020
slt-cyberattack.jpg

2min

On the issue of the attempted cyber-attack on SLT’s internal systems, SLT wishes to clarify the current situation to all its customers. The following is the official communique released by the Management.

We, SLT wish to communicate to our customers that we have detected an attempt of a cyber-attack, which has affected only a section of our internal IT systems.

Our vigilant early warning systems detected the attempt and precautionary measures with shutdown of some servers were implemented without delay.  These servers are isolated and corrective action is being taken. There is no impact to any system that is used to provide SLT services.  Thus, there is no risk to any services offered to our customers and also there is no risk to customer information.  System experts are attending to the issue and have already identified all the areas and SLT internal services will be restored in a short time.  Our expert teams have detected the threat at a very early stage and successfully isolated the problem.

SLT would like to affirm that all our government & business services, Voice Services, Broadband Services, PeoTV and Hosting Services are not impacted due to this internal issue and that the customer information is safe and secure.

The value added services such as ordering extra GB for Broadband services are also provided online, through the MySLT app and via contact center on 1212.

A REvil  attack, which has affected IT systems all over the world from time to time, has veen identified as the reason. We kindly advise our customers to implement required precautionary measures as much as possible by considering the current hostile nature of these cyber-attacks.

We thank you for your patience and understanding.

Thank you – SLT Management




May 12, 2020
sophoslab.jpg

4min

Sophos, a global leader in next-generation cybersecurity, today published a SophosLabs report, Don’t Let Fleeceware Sneak into Your iPhone, showing how Apple device users are being targeted by applications that overcharge users through costly subscriptions or unscrupulous in-app purchases. Sophos calls this kind of app “fleeceware” and researchers have found more than 30 iOS fleeceware apps available on Apple’s official App Store. Between them they appear to have been installed around 3.6 million times, according to publicly available data.

 

The fleeceware apps include image editors, horoscope/fortune telling/palm reader, QR code/barcode scanner, and face filter apps, with some charging weekly subscriptions of $9.99 (or $520 a year).

 

Sophos first alerted mobile users to fleeceware in September 2019, when it found a number of such apps available for Android phones. In January 2020, the researchers published a further paper, Fleeceware Apps Persist on the Play Store, detailing the discovery of another 20 such applications, with nearly 600 million alleged installations between them, as reported by Google Play.

“The main purpose of the iOS fleeceware apps we found seems to be severely overcharging users,” said Jagadeesh Chandraiah, senior security researcher at SophosLabs and the report author. “As was the case with the Android apps discovered in 2019, the app developers take advantage of monetization practices widely used by legitimate free apps, but take them one step further. For example, in the hands of the fleeceware app developers, short free trials followed by a monthly subscription soon add up to hundreds of dollars a year in charges, and in-app purchases turn out to be essential for good app functionality rather than optional enhancements or extras.

“Fleeceware apps are not officially malicious, but they are unethical, preying on consumer trust with devious techniques designed to make money. They appear to encourage unsuspecting users to install them through aggressive online advertising and what are likely to be fake five star reviews. Fortunately, there are some practical steps mobile users can take to better protect themselves against fleeceware. This includes knowing how to cancel an unwanted subscription and taking a close look at an app before installing it.”

Advice for mobile phone users

  • Only install apps from official and trusted app stores like the Apple App Store and Google Play – malicious or unscrupulous apps are regularly reported to them by security researchers and others
  • Despite that, always remain vigilant when installing apps, only install those you are familiar with, and carefully scrutinize those that are new or which you have heard about through in-app advertising
  • Know how to cancel subscriptions – just deleting the app from your phone is not enough. The best online directions are on Apple’s support page and Google’s Play Store support page
  • Have an effective security solution in place that will alert you to dubious applications before they can do any harm. For example, Sophos Intercept X for Mobile is available for free on theApple App Store and Google Play


About us

Lanka Business News is amongst the leading online Business News portals in Sri Lanka, unique for its focus on contemporary business news relevant across multiple industries operating in the country. We present not only the news, but a perspective based on observations and possible implications of a prevailing news item. LBN also provides an insight to the impact of a global economic or industrial development, thus helping stakeholders make informed and calculated decisions.




Follow Us


Newsletter