Google’s chief executive has defended the integrity of the company’s products a day ahead of a congressional hearing where he is expected to face tough questions from US lawmakers. In written testimony to the House Judiciary Committee made public on Monday, 10 December, CEO Sundar Pichai said he led the company...
The first thing anyone purchasing any device that connects to the Internet should do upon switching it on for the first time is to update it immediately. If you don’t, you risk having it hijacked by a botnet. So says Bryan Hamman, territory manager for sub-Saharan Africa at NETSCOUT Arbor,...
Global network and endpoint security company, Sophos, announced on Thursday, 11 July 20019, the findings of its global survey, The Impossible Puzzle of Cybersecurity. The survey reveals that IT managers are inundated with cyber-attacks coming from all directions and are struggling to keep up due to a lack of...
Did you know that 56% of all data breaches in 2016 began with a user clicking on a phishing email, giving hackers access to a corporate network? Everyone has something of value to a cybercriminal. Don’t take the bait – always stop and think before you act. Here are some...
In its Q3 IT Threat Evolution report, Kaspersky Lab has published the details of the key security incidents of the quarter. Using statistics from the Kaspersky Security Network (KSN), which obtains information from millions of Kaspersky Lab product users in 213 countries, the report sheds light on the increase...
NetApp’s global research has found that IT decision makers across the USA, UK, France and Germany believe GDPR will benefit their business when it comes to giving them the competitive edge. But while almost half (44%) believe GDPR will improve their position amongst all competitors, business readiness for the...
The double whammy of the largest data breach in South Africa’s Internet history coupled with the announcement that the wireless communication protocol used by virtually all wireless access points (WAP) world-wide had been hacked is bad news for both consumers and business showing just how fragile our virtual world...
AVG, a global security company launched AVG 2012 anti-virus product during a media function held at Melrose Arch, in Johannesburg, South Africa. Speaking at the official product launch in South Africa today, Peter Baxter, AVG VP for International Sales said 80% of malware now come from the web and not...
Smartphones continue to escalate in popularity as more mobile phone manufacturers release affordable smartphone handsets in order to attract consumers in emerging markets. It appears to have been a smart move. Leading IT research and advisory company, Gartner, Inc., recently revealed that while worldwide mobile phone sales saw a...
It was long overdue, but 2017 can be seen as the year the boards of South African companies finally sat up and paid attention to information security, says Paul Williams, Country Manager – Southern Africa at Fortinet. “As recently as just a few months ago, the Fortinet Global Enterprise Security...
According to a report by Nigerian Communications Week, over 100 undergraduates of tertiary institutions across the Southwest of Nigeria have been detained for various cybercrimes by the Ibadan Zonal Office of the Economic and Financial Crimes Commission (EFCC). According to The Nation Online, Kazeem Oseni, Commission's Deputy Zonal Head, Ibadan,...
The Electronic Entertainment Expo is an annual video game industry trade event that takes place at the Los Angeles Convention Center in the USA. Media and content creators are provided media badges by the ESA upon completion of the application process. According to gaming website Game Informer, this process...
Sepio Systems, a U.S. and Israel-based Rogue Device Mitigation company has partnered with distribution company Tech Data and IT solutions provider SHI to address hardware-based cyber-attacks. This is said to include invisible network devices, rogue peripherals and manipulated firmware. This solution is called Sepio Prime and is a software-only...
Oil & gas plants have increased their cyber risk profile as they modernise plants and close the ‘air gap’ between IT networks and operational technology (OT) networks. This is according to Phil Neray, VP of Industrial Cybersecurity at global security specialists CyberX, who notes that many oil & gas...
According to Forrester, 2017 will be a year of action. While the company has advised a strong focus on technology to improve customer experience, it has also warned that trying to play catch-up with early technology movers could spell disaster for companies who are unprepared. Forrester’s series of 2017 predictions...
Endpoint protection is one of the primary considerations for cybersecurity. There was a time when on-premise desktop computers were the only thing that had to be secured. However, BYOD and enterprise mobility have changed all that. There are now a number of different devices that are using an organisation’s network...
9,800FansLike
0FollowersFollow
22,877FollowersFollow

Recent Posts