smart homes

Are smart homes becoming easy prey for hackers?

January 29, 2015 • Opinion, Security, Top StoriesComments (0)

While the increasing use of home automation technology to create your version of a ‘smart house’ may be all the trend and seem practical, Richard Keymer Head of Pre-sales at SecureData Africa warns of the flipside in that once an automation system is established and can be operated remotely online, then chances are it can ...

Read More
Whatsapp web

New WhatsApp scam on the warpath

January 20, 2015 • Features, Security, Top StoriesComments (0)

As Africa is becoming more mobile focused, connecting via social media platforms such as WhatsApp, BBM, Facebook and Twitter is becoming more of a necessity. We, as Africans, use these platforms daily to not only converse with our peers, but to also conduct...

Kaspersky Lab

Kaspersky Lab identifies internal corporate IT threats

January 16, 2015 • SecurityComments (0)

According to the 2014 Global Corporate IT Security Risks survey, conducted by Kaspersky Lab and B2B International, 27% of all businesses have lost sensitive business data due to internal IT threats in the past 12 months. However, the global data shows that...

a recent survey shows 48% of HP customers like advice from their peers via online forums specific to their software. (Image Credit: Darryl Linington)

The Future of CyberSecurity

January 14, 2015 • Company News, Security, Top StoriesComments (0)

October 2014 marked forty-five years since the very first message was sent over the net – Arpanet (the forerunner of the internet) that is. Back then we didn’t have firewalls; there was nothing to monitor suspicious activity. It was a trusted environment...


What are the keys to effective information security?

December 17, 2014 • SecurityComments (0)

Rapidly evolving cyber threats and attack modes mean that every organisation should assume it has already been breached. The question now is – what to do next? Not only have cyber criminals become more sophisticated, but enterprise exposure to risk is...

Kaspersky Lab

Looking back at 2014′s cyber threats

December 10, 2014 • SecurityComments (0)

In 2014, Kaspersky Lab experts saw considerable growth in the number of malicious attacks on user computers and mobile devices, further development of financial malware and a change in the vectors of web attacks. According to Kaspersky Lab, based on the...

Top 5 2015 Cyber Security Threat Predictions

Top 5 2015 Cyber Security Threat Predictions

December 4, 2014 • Lists, Security, Top StoriesComments (0)

As 2015 approaches Fortinet and its threat research division FortiGuard Labs, have taken a look ahead to determine the most significant cyber security threats of the upcoming New Year – both from the perspective of a Black Hat hacker, as well as a Threat...

Cyber Crime tips

Infographic: How much do cybercriminals make from their victims?

December 1, 2014 • SecurityComments (0)

Cybercriminals could be raking in profits 20 times greater than the cost of their attacks, according to figures compiled by Kaspersky Lab experts. Their research compared the cost of the most frequently used hacker tools with the money stolen in a successful...


Security a top priority as Africa moves to LTE

November 11, 2014 • Opinion, SecurityComments (0)

Securing the network is a top priority for telcos and carriers as LTE becomes increasingly mainstream across Africa, says Fortinet. Perry Hutton, regional director of Fortinet for Africa, says: “LTE is changing the playing field. The previous generation of...

Cisco Connect 2014. (Image Credit: Darryl Linington).

Security research in SA uncovers heightened IT security risks

November 4, 2014 • Security, Southern Africa, Top StoriesComments (0)

Critical company data is at risk in South Africa as a result of organisations focusing IT security policies and resources more on external threats, such as cybercriminals and hackers, and not enough on the threat from within the business… this is...


Botnet Malware: Robots you want to avoid

November 4, 2014 • Opinion, SecurityComments (0)

Malware has been around in some form for over 40 years, but the use of malware to take control of a group of computers that are then organised into something called a botnet is more than a 21st century phenomenon, says Carey van Vlaanderen, CEO of ESET...


ESET reveals Smart Security 8 and NOD32 Antivirus 8

October 22, 2014 • SecurityComments Off

ESET Southern Africa revealed the latest versions of its security software products: ESET NOD32 Antivirus 8 and ESET Smart Security 8. According to ESET, the latest lineup includes Botnet Protection and Enhanced Exploit Blocker that protects against...

biggest security breaches

Infographic: 8 Biggest security breaches in history

October 22, 2014 • Security, Top StoriesComments Off

Over the years there has been many security breaches, with companies such as eBay being targets. The info graphic, which was submitted by, has visualised the 8 biggest security breaches in history —covering how and why we should be...

Jayson O'Reilly

Security challenges driving the need for security policies

October 15, 2014 • Opinion, SecurityComments Off

Businesses today face myriad complex threats coming at them from every angle. From hackers and hacktivists, to sophisticated cyber criminal gangs and nation-state funded advanced attacks, these threats can be catastrophic to the business. Add to this the...

Daniel Kamau Microsoft SMS&P Public Sector Lead, Sub-Saharan Africa. (Image Source: Microsoft).

Securing the cloud: The art of developing strong passwords

October 15, 2014 • Opinion, SecurityComments Off

Imagine if, within the space of a few hours, all your accounts in the cloud got hacked and you lost all your personal documents. That is exactly what happened to John, who, in keeping with the technological advancements, started saving all his personal...

Lutz Blaeser, MD of Intact Security (image: LivDigital)

No silver bullet for IT security

October 14, 2014 • Opinion, SecurityComments Off

The security landscape is a complex one, and several layers of defence at multiple points in the organisation are needed to successfully combat today’s sophisticated threats. Unfortunately, for too many businesses, the idea of a ‘quick fix’ is tempting,...