Windows 10 users have been urged once again to ensure that their systems are updated and properly protected with the latest security patches following the discovery of a dangerous new vulnerability. This comes via Tech Radar. This new warning emanates from US Homeland Security, whose cybersecurity advisory unit has discovered...
Passwords are the most common method of authentication, but they only work if they are hard to crack and confidential. And with an increasing number of applications requiring them, it can be hard to come up with new ideas for complex passwords and keep them all in your mind...
Cybersecurity solutions company, Trend Micro has appointed Conner Smith as its new Head of Partnerships and Alliances for the Sub Saharan Africa region. Smith joined the team at the beginning of June 2020 and responsible for leading the company's Channel Sales and Alliance strategy across the continent. "Our Channel remains...
Life Healthcare in South Africa announced that its IT systems have been compromised by cybercriminals. In an official statement, the private healthcare group says that it regrets to announce that its Southern African operation has been the victim of a targeted criminal attack on its IT systems - However, the...
According to researchers at IBM X-Force, Sphinx, a modular malware based on leaked source code of the infamous Zeus banking trojan began resurfacing in December 2019. However, a substantial increase in volume was reported in March 2020. This was due to Sphinx’s operators taking advantage of the interest and...
An increasing number of businesses are switching to a Software-Defined Wide Area Network (SD-WAN), which is a unique approach to wide-area networking because it combines traditional WAN technologies with the Internet and provides more visibility within an organisation. The move to SD-WAN is largely driven by distributed enterprises with multiple...
Videoconferencing company Zoom confirmed this week that it won't enable its end-to-end encryption for free calls because it wants to allow law enforcement access to these calls if necessary. Zoom's statement about the policy reads: "Zoom does not proactively monitor meeting content, and we do not share information with law...
The worldwide COVID-19 pandemic has forced families to spend their free time mostly at home. Staying at home usually also means spending much time using different Internet-connected devices. For clear reasons, children’s growing online activity can cause lots of worries for their parents. According to a Kaspersky survey, 41% of...
After hacking and taking down the Minneapolis Police Department website, the Anonymous hacker-group continued their protest spree and hacked the United Nations website, taking down a part of the site - the United Nations Civil Society Participation website - and replacing it with an image protesting the death of...
The cloud can enable organisations to quickly scale out enhanced security to a suddenly remote workforce, as part of efforts to ensure business continuity and disaster recovery - this is according to Patrick Grillo, Senior Director and Solutions Marketing at Fortinet. The pandemic had created unique challenges for employers and...
Ever opened your emails and received a poorly-worded message about a payment that you weren't expecting? What about one proclaiming that you've won a competition you never entered. "Congratulations!" it reads, beneath, a sinister attachment that you probably should not open. This is becoming more and more common, and now...
Cyber threats do not rest and they continue to evolve as bad actors develop new attack techniques. Good cybersecurity hygiene requires more than a strong password to avoid compromise. The most important thing is to know how exactly cybercriminals may attempt to gain access to your data. Here are seven...
Cybersecurity solutions company, Check Point Software has announced that its education initiative has partnered with Strathmore University in Kenya to provide a comprehensive cybersecurity curriculum to students, bridging the digital skills gap and also creating a safer local cyber landscape. According to research, the number of unfilled cybersecurity roles now...
Despite the technological innovation taking place, companies would do well to remain focused on ensuring their IT fundamentals are in place before rushing to capitalise on the latest trends. And nowhere is this more critical than when it comes to cybersecurity. Expectations are that the impact of global cybercrime will...
A renowned iPhone hacking team has released a new 'Jailbreak' tool that unlocks every iPhone, even the most recent models running the latest iOS 13.5. For as long as Apple has kept up its walled garden approach to iPhones by only allowing apps and customization that it approves, hackers have...
One of the most common forms of cyberthreats designed to collect personal information from a user’s device is mobile adware. This is because roughly 4 billion people are connected to the Internet via their smartphone. Despite the adoption of mobile devices, companies rarely prioritize mobile security. Check Point’s Cyber Security...
9,800FansLike
265FollowersFollow
22,689FollowersFollow

Recent Posts