Today’s malware has the capacity to spread like wildfire, with millions of computers infected in an instant as an epidemic sweeps across the Internet. This can take down huge swathes of infrastructure, bringing information highways to a standstill and leaving systems vulnerable to data leakage which in turn opens...
A recent overseas survey of 460 IT decision makers in medium to large organisations has returned surprising but increasingly familiar results: virtualisation brings savings, but it can also increase costs in other areas. CA Technologies commissioned an independent market research company to conduct the survey and the results are mirrored...
Hackers have declared war on Android devices. This is evident with the increasing number of attacks seen in the last month, most recently with the fake versions of the Instagram Android app, which sends background SMS messages to premium rate services, earning its creators revenue. According to Juniper Networks,...
Surveillance cameras have altered the meaning of security monitoring as well as law enforcement measures. The occurrence of theft and threats from wrongdoers and dodgy elements has made it vital to install CCTV security cameras in schools. It helps to reduce the vulnerability experienced by young students and teens. Running...
COVID-19 will continue to be a key focus for organizations’ IT and security teams, says cybersecurity solutions company Check Point. “The pandemic derailed business-as-usual for virtually every organization, forcing them to set aside their existing business and strategic plans, and quickly pivot to delivering secure remote connectivity at massive scale...
Over 500,000 Zoom accounts are being sold on the dark web and hacker forums for less than $0.01, and in some cases, given away for free, via Bleeping Computer. These credentials are gathered through credential stuffing attacks where cybercriminals attempt to login to Zoom using accounts leaked in older data...
As organisations embark on their digital transformation journeys, they are seeking to tap new business opportunities, improve operational efficiencies, and deliver better services to customers. Digital transformation is driving businesses to embrace the cloud, the Internet of Things (IoT), big data, and other digital initiatives in ever-expanding waves, forcing...
As African banks layer more security into their banking procedures, software manufacturer Oracle has unveiled solutions which it says makes transactions easier and more secure. Speaking to IT News Africa in Durban this week at the Oracle User Group Conference in Durban, Nazif Mohammed, Vice President Financial Services, said, “We...
Global technology association ISACA has announce additions to the Cybersecurity Nexus (CSX) portfolio of resources—the CSX Training Platform and Assessment Tool. The CSX Training Platform offers learners accessible, constantly updated education environment that gives administrators clear insights into employee performance so organizations can ensure that they hire and retain the...
The International Air Transport Association (IATA) of South Africa has issued an edict that all IATA accredited air ticket distributors - or travel agents - must comply with Payment Card Industry Data Security Standards (PCI DSS) by March 2018. While this is not a new requirement, with a previous...
In the world of enterprise technology, one of the biggest areas of concerns for Chief Security Officers (CSO) are the laptops, desktops, tablets, smartphones and other connected devices used by staff. Each one represents a potential vulnerability: where sensitive company data could be lost, leaked or intercepted. For the CSO,...
Trends such as mobility, BYOD (Bring Your Own Device) and cloud have completely revolutionised the way we do business, by giving users access to the information they need anytime and from anywhere. Unfortunately, as much as businesses have gained from these trends, so have they been put at risk,...
Women represent around 20% of the global cybersecurity workforce, according to a report released by Cybersecurity Ventures. This comes a mere two years after Frost & Sullivan pointed a menacing finger at the 1.8 million vacant cybersecurity seats by 2020 and the dearth of skills and people within an...
Kaspersky Lab, a developer of secure content and threat management solutions, has been ranked by Gartner as one of the fastest growing vendors in the global security software market, placing it among the top 10 vendors by revenue in 2010. The ranking was published in a special report that supplemented...
The overall global Internet threat level grew by 6.9 percentage points in 2013 - 41.6% of user computers were attacked at least once. In order to conduct all these attacks over the Internet in 2013, cybercriminals used 10,604,273 unique hosts, which is 60.5% more than in 2012. The USA and...
Threat actors have ramped up their attempts to pollute the IT networks of hospitals with ransomware even as the COVID-19 pandemic continues, according to the recent findings of INTERPOL. The adverse outcome of such an incursion is not restricted to data damage or monetary damages to the organization. It also hinders...
9,800FansLike
0FollowersFollow
22,877FollowersFollow

Recent Posts