MENU

Security
Category

data breach, GoT, Security, HBO

Hackers leak Game of Thrones fourth episode script

August 3, 2017 • Security, Top StoriesComments Off on Hackers leak Game of Thrones fourth episode script

Written material that is allegedly from the fourth episode of Game of Thrones was leaked after a cyber attack hit HBO. The cybercriminals also leaked an upcoming episode of Ballers and Room 104. The hackers claimed to have obtained 1.5 terabytes of data from the company. The Chief executive Richard Plepler confirmed the incident in an [&hellip...

Read More
IoT, SqwidNet, Cloud, security

The future of the Internet of Things: security is everything!

August 3, 2017 • Internet of Things, Opinion, Security, Southern AfricaComments Off on The future of the Internet of Things: security is everything!

The Internet of Things (IoT) is counted among emerging technologies that promise to transform the South African market. While the opportunity for IoT is young in South Africa, its potential influence is far-reaching. For example, in the mining industry,...

eSIM, Gemalto, IoT

Gemalto first in the world to be fully-certified by the GSMA for secure eSIM

August 3, 2017 • Mobile and Telecoms, Security, Top StoriesComments Off on Gemalto first in the world to be fully-certified by the GSMA for secure eSIM

Gemalto, a digital security company has announced that its On-Demand Connectivity Service has become the first in the world to demonstrate full compliance with the stringent security requirements of the GSMA’s Security Accreditation Scheme for embedded SIM...

mobile security, mobile telecomms

Opinion: Mobile Phones are Under Attack

August 3, 2017 • Mobile and Telecoms, Online & Social, Opinion, SecurityComments Off on Opinion: Mobile Phones are Under Attack

Long-known but relatively obscure vulnerabilities in global mobile telecommunications systems are reaching a wider audience, including cybercriminals, who are always looking for new ways to intercept sensitive data and co-opt user authentication sessions...

Cyber Crime tips, Security, Risks, Cyber, Threats,Cyber Crime Bill, South Africa, Warning, Privacy, Freedom

Warning: SA Cybercrime Bill Will Endanger your Freedom!

August 2, 2017 • Features, General, Security, Southern Africa, Top StoriesComments Off on Warning: SA Cybercrime Bill Will Endanger your Freedom!

South Africans have just a few more days to air their views on the 2017 version of the Cybercrimes Bill. The Bill was designed to eradicate various cyber offences such as cyberbullying and hacking. The problem however, is that if this Bill is passed, we could...

Security, Risks, DDOS, Cyber, Threat, Crime, WanaCry, ant-virus software,

The likelihood of being hacked is at an all time high – it’s time to up your security game

July 31, 2017 • Security, SponsoredComments Off on The likelihood of being hacked is at an all time high – it’s time to up your security game

Two significant events happened recently. One positive, the other, cripplingly negative. First the good: The International Labour Organization recently recognised cybersecurity as part of World Day for Safety and Health at Work, as being hacked does not just...

Kaspersky Lab, Improve, Online Safety, Children, Parents, Questions,

Kaspersky Lab To Improve Online Safety For Children

July 31, 2017 • Security, Top StoriesComments Off on Kaspersky Lab To Improve Online Safety For Children

Kaspersky Lab has announced that for the month of August the security company will be opening an email address that parents and guardians can send their questions to for feedback, to ensure the safety of their children online. The email address, which will...

South Africa, Fake, Government, Websites, Warning, Cyber Fraud, Security, Phishing

South Africa- Beware Of Fake Government Websites

July 28, 2017 • Online & Social, Security, Southern Africa, Top StoriesComments Off on South Africa- Beware Of Fake Government Websites

Yesterday the ZA Central Registry sent out a warning to all South Africans to be on the look out for fake versions of South African government email addresses and websites. Alleged online fraudsters have been creating these fake sites in order to trick...

Cyber attacks moving to mobile

Tanzania continues to fight cybercrime

July 28, 2017 • East Africa, Security, Top StoriesComments Off on Tanzania continues to fight cybercrime

In a bid to protect citizens and businesses from malicious hackers and cyber-criminals, the government of Tanzania is drafting new internet legislation. The government hopes to cooperate with China to introduce the Personal Data Protection Act to make...

laptop, travelling, tablets, security

Top 8 tips to consider when travelling with your technology

July 27, 2017 • General, Security, Top StoriesComments Off on Top 8 tips to consider when travelling with your technology

Preparing for a long international trip usually involves lists, and adding technology to the long inventory for a holiday or business trip abroad can create unforeseen headaches. Mohamed El Aougri, sales director for Targus South Africa offers the following...

Sanjay Vaid, Director, Cybersecurity and Risk Services-Africa & CE, Wipro Limited.

Is security compromising availability of your business?

July 27, 2017 • Opinion, SecurityComments Off on Is security compromising availability of your business?

Cyber-crime is on the rise, affecting vulnerable businesses across the globe. The effects of a security breach can be catastrophic, leading to loss of reputation and possibly monetary losses as well. It is vital that organisations stay on top of cybercrime...

Fintech, Bitcoin, Data, mobile money,

Uganda on the Fintech curve

July 26, 2017 • East Africa, Finance, Opinion, SecurityComments Off on Uganda on the Fintech curve

In the financial world, technological disruption is nothing new, having triggered far-reaching change over the centuries. The banking world of today is poles apart from that of ancient Babylon where merchants offered grain to farmers to transport goods. The...

Cyber, Security, Gartner predicts increase spending on IT security in 2017.

Bridge the ‘Gap of Grief’ with RSA

July 25, 2017 • Security, Software, SponsoredComments Off on Bridge the ‘Gap of Grief’ with RSA

A Business-Driven Security architecture was recently unveiled by RSA, a Dell Technologies business, offering a new approach to assist enterprises to manage cyber risk and protect what matters most to them, be it their financial records, IP, and more. The...

e-commerce, cybercrime,security cyber security,

Is your payroll data protected against cyber-crime

July 25, 2017 • Opinion, Security, SoftwareComments Off on Is your payroll data protected against cyber-crime

According to the 2017 Trustwave Global Security Report, gangs of cyber-criminals prefer to target commonly used software platforms with known vulnerabilities. Corporate and internal networks, as well as point-of-sale (POS) systems are most at risk, falling...

Connectivity has made South Africa vulnerable to the threat of online fraud and identity theft.
(pixabay.com)

Keeping your ID safe in the cybersphere: 4 tips you need to know

July 21, 2017 • Security, Southern AfricaComments Off on Keeping your ID safe in the cybersphere: 4 tips you need to know

Over the course of the past decade, the brick-and-mortar institutions of yesteryear have rapidly been replaced by online counterparts, with South Africans now turning to the Internet to perform banking transactions, book flights and even shop for groceries....

Cyber Crime, Credit card, Fraud, Russia, Schools, Report, Digital Shadows

A School For Cyber Criminals?

July 21, 2017 • General, Security, Top StoriesComments Off on A School For Cyber Criminals?

Digital Shadows, a digital risk management company, today revealed the findings of an in-depth study carried out by its team of multilingual analysts assessing the changing habits and tactics of organized credit card fraud gangs. It points to increased...