MENU

Security
Category

Don’t get infected this Valentine’s Day

February 12, 2010 • SecurityComments Off on Don’t get infected this Valentine’s Day

Global IT security vendor Panda Security has warned that malware using Valentine’s Day as a way of tricking users into infecting computers is now a well-established feature of the IT security calendar. Once again, this year, Panda says it will be no surprise to see numerous emails in circulation with links for downloading romantic greetings [&hellip...

Read More

Symantec launches website to track World Cup scams

February 10, 2010 • SecurityComments (4)

Symantec Corp. today announced it will be tracking malicious activity on the Internet relating to the soccer World Cup, which starts on June 11. On its dedicated Web site, www.2010netthreat.com, Symantec will provide data, commentary, safety tips and useful...

Ten things your firewall should do

February 9, 2010 • Opinion, SecurityComments Off on Ten things your firewall should do

Martin Tassev, Managing Director at Loophold Security Distribution, analyzes the firewalls’ capabilities to meet security demands and data protection inside organizations...

SAP, Nokia, G&D to join forces in new venture

February 2, 2010 • SecurityComments Off on SAP, Nokia, G&D to join forces in new venture

SAP, Nokia and Giesecke & Devrient (G&D) today announced the founding of their joint venture, Original1 GmbH, after antitrust authorities have approved the establishment plans, initially announced in October ...

McAfee: Cameroon has the Web’s riskiest domain

February 1, 2010 • SecurityComments (1)

According to McAfee’s latest annual Mapping the Mal Web report compiled during last year, Cameroon (.cm) has overthrown Hong Kong (.hk) as the riskiest domain on the web, while commercial (.com) is regarded the second most dangerous...

Nigerian National Assembly to tackle cyber crime

January 27, 2010 • SecurityComments Off on Nigerian National Assembly to tackle cyber crime

The Nigerian senate is determined to rid the West African country of the menace of cyber crime that has become a global concern, the country’s Senate Committee on Communication has said...

New security threats invade Africa in 2010

January 25, 2010 • SecurityComments (1)

Internet threats this year are set to skyrocket due to increased internet activity in the East Africa region. This is as a result of the linkage to two undersea fibre optic cables in ...

Countdown to ICT Security Africa Summit in Kenya

January 21, 2010 • SecurityComments Off on Countdown to ICT Security Africa Summit in Kenya

Preparations for the Information and Communication Technology (ICT) Security Africa Summit 2010 have begun.The event, which is scheduled for Kenya in May, and is organized by the MIS Training Institute and the African Information Security Association, is...

ICT security providers unite to fight cyber crime

January 19, 2010 • SecurityComments Off on ICT security providers unite to fight cyber crime

Consumer data, or personal information, is under constant and increasing threat, agree Condyn, Safenet and Mark Heyink from Information Governance Consultancy, who have scheduled various events in South Africa covering the implications of the security...

Be smart – don’t let cybercrime catch you out

January 6, 2010 • Opinion, SecurityComments (1)

Cybercrime, by definition, is any form of criminal activity that takes place within the realms of cyberspace. This type of crime is rife and is ever on the increase, with cybercriminals constantly coming up with new ways to take advantage of unwary internet...

Nigeria seeks ways to curb online crime

January 5, 2010 • SecurityComments Off on Nigeria seeks ways to curb online crime

The president of the Institute of Software Practitioners of Nigeria (ISPN) has called on Nigeria to invest on secured internet protocol versions to curb the menace of internet scams that allegedly originate from the West African country...

Hardware security appliances, obsolete by the end of 2011?

December 10, 2009 • SecurityComments (1)

SpamTitan Technologies, the producers of spam and web filtering software, announced yesterday a bright future for virtual cloud computing offerings, predicting an increase in customer preference for virtalised-driven security solutions leading to redundancy...

Reputation-based security – the next step

November 27, 2009 • SecurityComments (1)

The Information Communication Technology (ICT) security threat landscape has gone through significant changes in the last few years, which in turn have altered the distribution profile for new malware...

10 tricks used by spammers to get into your inbox

November 19, 2009 • SecurityComments Off on 10 tricks used by spammers to get into your inbox

Everybody hates email spam. It is annoying and wastes time, takes up disk space and can slow down the network. And despite the increasingly advanced efforts by the companies that make money from combating spam,...

Internet banking – know the risks

November 10, 2009 • SecurityComments (3)

Internet banking is widely used, especially by individuals and small and medium businesses, because it is easy and convenient, available 24 hours a day, seven days a week and typically incurs far less bank fees than going in to a branch to do banking...

Former employees a growing IT security threat

November 9, 2009 • SecurityComments (1)

Reprisals from recently departed employees and a lack of adequate security budgets and resources are becoming major concerns for senior IT professionals, according to the 12th annual Ernst & Young 2009 Global Information Security Survey (GISS)...