MENU

Security
Category

Paul Williams, Country Manager SADC at Fortinet.

Securing your growing home network

March 22, 2017 • General, Opinion, Security, Southern AfricaComments (0)

The number of connected devices in South African homes are expected to increase exponentially. Smart TVs, connected appliances, online fitness devices, entertainment and gaming systems, smart cars, connected water and power meters, climate control systems and online home security systems are all available. Many home networks also include things like...

Read More
Android Nougat 7.0

The why and how of encrypting files on your Android smartphone

March 22, 2017 • Mobile and Telecoms, Security, Top StoriesComments (0)

Your smartphone is crammed with sensitive information about your life, from confidential business emails and mobile banking passwords to private photos and social media logins. That means you should secure it as carefully as you would your credit cards or...

An emerging threat known as Floki Bot targets POS systems with aggressive spear phishing campaigns accompanied by a RIG exploit kit, aiming to scrape credit and debit card details.

As retail payments burst with innovation, new threats emerge

March 22, 2017 • Finance, Online & Social, Retail, SecurityComments (0)

The payments space is one of the most vibrant areas of financial services at the moment, with consumers craving faster, simpler ways to make payments – especially for those regular, low-value transactions that punctuate our daily comings-and-goings. Banks,...

AJ Hartenberg, Portfolio Manager: Data Centre Services at T-Systems South Africa.

Cloud Security: the 5 most important considerations

March 17, 2017 • Cloud Computing, Opinion, SecurityComments (0)

Forewarned, as they say, is forearmed. And being well-armed for the barrage of emerging cyber threats is essential as you plot your journey to enterprise cloud services. T-Systems’ AJ Hartenberg looks at the 5 biggest cloud security considerations: 1....

Biometrics and facial recognition to be used in the registration process.

World First, PayToo to Use Biometrics and Facial Recognition in Sign Up Process

March 16, 2017 • Finance, Mobile and Telecoms, Security, Top StoriesComments (0)

PayToo® Wallet, a mobile banking solution, announced on the 9th of March the exclusive release of PayToo® Assistant, a new digital application that uses facial verification and biometrics to verify customers’ identity, facilitating the PayToo® sign...

Blockchain based security technology has the capability to register and validate billions of events per second, making it ideal to meet the needs of an IoT world. (image source: pixabay.com)

Preventing intrusion in the age of blockchain and IoT

March 15, 2017 • Internet of Things, Opinion, SecurityComments (0)

The era of the Internet of Things (IoT) is here, bringing with it a host of ‘futuristic’ functionality, from fully smart buildings which can be monitored and controlled through a single handheld device, to smart health devices which can detect...

A printer is an entry point into your network. And for most companies, it is a security blind spot. (image: Pixabay)

Print security: is your network at risk?

March 14, 2017 • Hardware, Security, Top StoriesComments (0)

Sat quietly in the corner, your office printer might not appear to be the biggest security risk. However, studies suggest it could be a gateway to a whole host of malware, ransomware, and social engineering threats. If left unprotected, printers can be a...

Ernst Wittmann, Regional Manager for Southern Africa at ALCATEL.

5 ways to keep your IoT devices safe and secure

March 14, 2017 • Internet of Things, Lists, Opinion, SecurityComments (0)

The Internet of Things (IoT) is rapidly taking off as people and businesses connect everything from their cars, to their home automation systems, and to the Internet. These devices are starting to change how we live and work – allowing us to track our heart...

The growing skills gap as demand for qualified cyber security professionals continues to outstrip supply (image: Shutterstock)

7 WAYS TO PROTECT YOUR BUSINESS FROM ONLINE THREATS

March 14, 2017 • Lists, Online & Social, Security, Top StoriesComments (0)

The rising prevalence of hacking and use of malware to acquire sensitive information and/or personal data from unsuspecting targets have made companies and businesses buckle up and make IT security a top priority, especially considering the recent hacks of...

Kaspersky Lab

Kaspersky Fraud Prevention Cloud enables machine learning

March 13, 2017 • Security, Top StoriesComments (0)

Kaspersky Lab has released a Fraud Prevention cloud solution for organisations facing risks from fraudulent activity via fast-growing online services. The new product features a set of cloud-based technologies designed to give banks, financial institutions,...

Joint Trend Micro and Interpol release Cybercrime in West Africa: Poised for an Underground Economy report. (Image source: Business Advice UK)

Growth in West African Cybercrime

March 10, 2017 • Security, Top Stories, West AfricaComments (0)

Trend Micro Incorporated, a global leader in cybersecurity solutions, in collaboration with INTERPOL, has released research on cybercriminal activity in West Africa, “Cybercrime in West Africa: Poised for an Underground Economy,” as part of its ongoing...

Darren Anstee, Chief Security Technologist at Arbor Networks.

Weaponised IoT attacks: what does the future hold?

March 10, 2017 • Internet of Things, Opinion, Security, SponsoredComments (0)

The explosion of connected devices onto our networks is fuelling our imaginations and inspiring incredible visions for the future. There is limitless potential in being able to connect and integrate our cars, houses, appliances, and everything else we own....

Cybercrime; the ever growing threat of online interactions.

10 Biggest Cyber Crimes and Data Breaches

March 7, 2017 • Lists, Security, Top StoriesComments Off on 10 Biggest Cyber Crimes and Data Breaches

Cyber criminals are becoming more sophisticated at picking our virtual pockets and uncovering almost all our personal information available online- yet most of us remain woefully unprepared. A 2016 survey, conducted by PricewaterhouseCoopers, highlighted...

Cyber Crime tips

SA’s biggest fear is theft of private data

March 7, 2017 • Security, Southern Africa, Top StoriesComments Off on SA’s biggest fear is theft of private data

Lushen Padayachi, Head of Security at BT In Africa, stressed the need for digital businesses in South Africa to adopt a more proactive approach to cyber-security that entails a better understanding of the risks. With the size of the internet economy alone...

5 Reasons you should have a password on your device.

5 Reasons To Have A Password Lock On Your Device

March 2, 2017 • Lists, Mobile and Telecoms, Security, Top StoriesComments Off on 5 Reasons To Have A Password Lock On Your Device

It is time to get rid of the notion that using a password for your devices means you have something to hide. In today’s world where sensitive data like banking and account details, social security details, corporate email information and so on is stored...

Fortinet Security

Mobile Advertising Trojans the Top Mobile Malware Threat in 2016

March 2, 2017 • Security, Top StoriesComments Off on Mobile Advertising Trojans the Top Mobile Malware Threat in 2016

In 2016 a total of 8.5 million malicious installations identified, seeing a near-threefold rise in mobile malware compared to 2015. This means that, in the space of just one year, a volume equivalent to 50% of all the malware detected in the previous 11 years...