MENU

Security
Category

5 Reasons you should have a password on your device.

5 Reasons To Have A Password Lock On Your Device

March 2, 2017 • Lists, Mobile and Telecoms, Security, Top StoriesComments Off on 5 Reasons To Have A Password Lock On Your Device

It is time to get rid of the notion that using a password for your devices means you have something to hide. In today’s world where sensitive data like banking and account details, social security details, corporate email information and so on is stored on your device, it is only in your best interest to [&hellip...

Read More
Fortinet Security

Mobile Advertising Trojans the Top Mobile Malware Threat in 2016

March 2, 2017 • Security, Top StoriesComments Off on Mobile Advertising Trojans the Top Mobile Malware Threat in 2016

In 2016 a total of 8.5 million malicious installations identified, seeing a near-threefold rise in mobile malware compared to 2015. This means that, in the space of just one year, a volume equivalent to 50% of all the malware detected in the previous 11 years...

While online banking is a great way of having quick access to your bank account, consumers should make sure that they are well-protected. (image: Pixels)

Online banking fraud – consumers have a say and a responsibility

March 2, 2017 • Security, Southern Africa, Top StoriesComments Off on Online banking fraud – consumers have a say and a responsibility

Incidents of online banking fraud continue to rise in South Africa as more consumers become comfortable with transacting on the internet. While cyber fraudsters are known to target companies – or financial institutions – in order to steal larger amounts,...

Theo Watson, Commercial Attorney at Microsoft South Africa.

Asking the right questions about POPI and compliance

March 1, 2017 • Cloud Computing, Opinion, Security, Southern AfricaComments (1)

Digital transformation is touching every sector as well as every industry, disrupting the traditional market leaders, value chains and conventional ways of doing business along the way. While the technology (IoT, big data analytics, machine learning,...

Martin Walshaw, Senior Engineer at F5 Networks.

Service Providers urged to bolster defences against evolving IoT threats

February 27, 2017 • Internet of Things, Security, Top StoriesComments Off on Service Providers urged to bolster defences against evolving IoT threats

Application security company F5 Network encouraged EMEA service providers to step up their defences against large-scale Internet of Things (IoT) hijacks. The call to arms comes in the wake of the recent Mirai botnet, which infected hundreds of thousands of...

Paul Williams Country Manager - SADC at Fortinet.

SA healthcare braces to take on risk

February 23, 2017 • Healthcare, Security, Southern Africa, Top StoriesComments Off on SA healthcare braces to take on risk

The security risks facing the healthcare sector have never before been so broad or so complex, reports Fortinet. “Thanks to digitisation across the sector, the advent of Internet of Things (IoT) and wearables, and the increasing sophistication of cyber...

Doros Hadjizenonos, Country Manager of Check Point South Africa.

Ransomware doubled in second half of 2016, says Check Point

February 22, 2017 • Security, Top StoriesComments Off on Ransomware doubled in second half of 2016, says Check Point

Check Point® Software Technologies Ltd released its H2 2016 Global Threat Intelligence Trends, revealing that ransomware attacks doubled during the period. Out of all recognised malware incidents globally, the percentage of ransomware attacks increased from...

DDoS attacks affect more than just IT.

DDoS, what you need to know about this type of cyber attack

February 22, 2017 • Security, Top StoriesComments Off on DDoS, what you need to know about this type of cyber attack

With Distributed Denial of Service (DDoS) attacks increasing considerably in size, frequency and complexity, according to the recently released Arbor Networks’ 12th Annual Worldwide Infrastructure Security report, the chances of organisations being hit by a...

Amy DeMartine and Jeff Pollard Forrester's analysts.

Take action or face the consequences says Forrester

February 16, 2017 • General, Internet of Things, Opinion, SecurityComments Off on Take action or face the consequences says Forrester

According to Forrester, 2017 will be a year of action. While the company has advised a strong focus on technology to improve customer experience, it has also warned that trying to play catch-up with early technology movers could spell disaster for companies...

Blockchain based security technology has the capability to register and validate billions of events per second, making it ideal to meet the needs of an IoT world. (image source: pixabay.com)

IoT 2020: Smart and secure IoT platform

February 16, 2017 • Internet of Things, Security, Top StoriesComments Off on IoT 2020: Smart and secure IoT platform

The Internet of Things (IoT) significantly impacts the global economy and is expected to grow exponentially over the coming years, transforming society as a whole. In order to develop a smart and secure IoT platform, certain critical issues must be addressed...

The growing skills gap as demand for qualified cyber security professionals continues to outstrip supply (image: Shutterstock)

Cyber security skills gap leaves 37% organisations exposed

February 14, 2017 • Security, Top StoriesComments Off on Cyber security skills gap leaves 37% organisations exposed

Sophisticated cyber security defenses are increasingly in high demand as a cyber security attack is now viewed as an inevitability. However, a majority of surveyed organizational leaders fear they are ill-equipped to address these threats head-on. According...

Alastair Paterson, CEO and Co-Founder of Digital Shadows (Source: YHP)

Sometimes it’s Best to Avoid “Cupid’s” Arrow

February 13, 2017 • Opinion, Security, Southern AfricaComments Off on Sometimes it’s Best to Avoid “Cupid’s” Arrow

Valentine’s Day is fast-approaching and the story goes that if Cupid hits you with his golden arrow you’ll fall madly in love. And who doesn’t want to fall madly in love? But there are other actors taking aim at you on Valentine’s Day whose arrows you...

6 ways that hackers can access your bank account.

6 ways your bank account could be hacked

February 9, 2017 • Security, Top StoriesComments Off on 6 ways your bank account could be hacked

With the heightened threat of hacks by fraudsters attempting to access people’s bank accounts through text messages, emails, phone calls etc., it is important we are armed with knowledge of the different ways our bank accounts can be hacked by these...

Kaspersky Lab

Cybercriminals target 40 countries using “invisible” malware

February 9, 2017 • Security, Top StoriesComments Off on Cybercriminals target 40 countries using “invisible” malware

Kaspersky Lab experts have discovered a series of “invisible” targeted attacks that use only legitimate software: widely available penetration-testing and administration tools as well as the PowerShell framework for task automation in Windows – dropping...

Martin Walshaw, Senior Engineer at F5 Networks.

Protect yourself from cybercriminals this Valentine’s day

February 8, 2017 • Big Data, Cloud Computing, Opinion, SecurityComments (2)

According to romantic legend, St. Valentine was quite the match-maker, marrying young couples against the wishes of Emperor Claudius II and literally losing his head into the bargain. It is a good yarn but, in truth, nobody knows who he really was. In...

Danie Marais, Director of Redstor.

Safer Internet Day 2017- Redstor’s contribution

February 7, 2017 • Cloud Computing, Online & Social, Opinion, SecurityComments Off on Safer Internet Day 2017- Redstor’s contribution

Specialised cloud software and backup services provider Redstor is urging the market to unite for a better internet and support the global Safer Internet Day 2017 on Tuesday 7 February. The annual worldwide initiative is organised to encourage users of...