"Around the world, 2020 was an unprecedented year for IT teams," said Chester Wisniewski, principal research scientist, Sophos. IT professionals played a vital role in helping organizations to keep going despite the restrictions and limitations necessitated by COVID-19. Among other things, they enabled education institutions to move learning online, retailers to...
Cybercrime taps into the vulnerability of business systems and can pose a real threat to a robust supply chain. A sophisticated ransomware attack recently targeted the world’s largest meat processor. Following the business system breach, operations in the US and Australia were disrupted, resulting in a knock-on effect. The meat processor...
The eleventh hour is upon businesses who are not POPIA (Protection of Personal Information Act) compliant. The effective date of 1 July is upon us. Your business should have already started its compliance journey, as it will at least help lessen the risk of cybersecurity breaches. Securing your data will...
A concerning number of South African companies are not prepared for the inevitability of a cyberattack despite the significant financial and reputational risks, according to Ryan Mer, MD, eftsure Africa, a Know Your Payee (KYP) platform provider. "Too few senior managers view cybersecurity as a business problem and not just...
Recognised as the world’s top-selling game of all time, Minecraft attracts the attention of enthusiastic players around the world but also draws the interest of fraudsters. Earlier, Kaspersky researchers discovered more than 20 applications advertised on app stores offering additional Minecraft features. Though these malicious apps were deleted from official...
You may not even notice when you receive one, most suspicious emails are automatically sorted to spam by your email service - though, a few may slip through the cracks, and one or two may even be authentic enough for you to click through their contents. The most important thing...
Gaming mega-publisher EA has been struck by a massive data hack. The hackers responsible have absconded with the source code for the hugely popular FIFA 21, as well as the source code for EA's Frostbite Engine - the game-running shell and development tools behind FIFA as well as EA's...
In April, Kaspersky experts discovered a number of highly targeted attacks against multiple companies utilising a previously undiscovered chain of Google Chrome and Microsoft Windows zero-day exploits. One of the exploits was used for remote code execution in the Chrome web browser, while the other was an elevation of privilege...
The rapid pace of digital transformation in East Africa has had a significant impact on not only how people live their lives, but also on how communication and commerce are conducted, allowing the modern customer to do everything – immediately. This has also had the unintended consequence of altering the...
In this past year, the consumer experience came to the forefront. As we faced various stages of lockdowns, we turned to online banking, seeing our doctors remotely, running our businesses using technology and socialising through a screen. Digital interactions became a part of our lives – ever-present and normalised...
Check Point Research (CPR) urges Windows users to update their software, after discovering four security vulnerabilities that affect products in the Microsoft Office suite, including Excel and Office online. The loopholes were found in sections of legacy code, the vulnerabilities could have granted an attacker the ability to execute code...
With an inundation of information from all angles regarding The Protection of Personal Information Act (POPIA), and the 1 July commencement date quickly approaching, organisations could be forgiven for feeling more than a little overwhelmed. Emmanuel Tzingakis, Technical Lead for Trend Micro Sub-Saharan Africa, contemplates how POPIA can assist organisations...
To prevent becoming the victim of fraudsters, it’s vital to be on guard, especially when using transactional, card-based accounts linked to cheque and savings accounts. Vijay Naidoo, CIO at Old Mutual Finance, pointed out that "...transactional accounts are among the most commonly used accounts, which means they are prime targets...
The pandemic has driven home the high value of personal data to the global economy, while also highlighting its vulnerability to abuse and attack. In response, governments around the world have been reviewing their data privacy and protection laws and regulations, including in South Africa and Ghana. Global cybersecurity firm Kaspersky...
As more consumers go online for banking and other financial transactions, new research from TransUnion, an American consumer credit reporting agency, has found that fraudsters are ramping up their efforts in the financial services industry. When comparing the last four months of 2020 (September 1 - December 31) and the...
South Africa's Cybercrimes Bill has finally been signed to law by President Cyril Ramaphosa. Now an act of parliament, the bill seeks to bring the country's cybersecurity laws in line with the rest of the world. One of the features of the new bill is the creation of offences and the...
9,800FansLike
0FollowersFollow
22,877FollowersFollow

Recent Posts