MENU

Posts Tagged ‘cybercriminals’

  • Data security sits at the heart of democracy

    Data security sits at the heart of democracy

    January 15, 2019 • Opinion, Security, Southern AfricaComments (0)

    Military risks immediately spring to mind: a recent report found that even the Pentagon’s latest advanced military systems are vulnerable and can be “easily hacked”. The consequences for citizens of rogue military assets is unthinkable. But...

  • Human element is the biggest threat to your cyber security

    Are we prepared to face 2019’s cyber security challenges?

    January 10, 2019 • Opinion, SecurityComments (0)

    “Technology is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other,” wrote novelist and scientist C. P. Snow in the New York Times in 1971. It still rings true today. Every new tool or technology we...

  • Connected car chargers could leave home networks vulnerable

    Connected car chargers could leave home networks vulnerable

    January 8, 2019 • SecurityComments (0)

    While modern electric vehicles are tested constantly for vulnerabilities, some of their essential accessories, such as the battery chargers, often remain neglected. Kaspersky Lab experts have discovered that electric vehicle (EV) chargers supplied by a major...

  • Biometrics has a keen stake in the war on identity fraud

    December 6, 2018 • SecurityComments Off on Biometrics has a keen stake in the war on identity fraud

    Identity fraud remains one of the most prominent cybercrime threats of modern society today. Global research notes that on average businesses loose over US$ 200 billion every year – while consumers loose more than US$ 16 billion due to identity fraud. In...

  • What we can expect from IT security in 2019

    Endpoint Detection and Response – the best way to do it

    November 7, 2018 • Opinion, SecurityComments Off on Endpoint Detection and Response – the best way to do it

    Endpoint protection is one of the primary considerations for cybersecurity. There was a time when on-premise desktop computers were the only thing that had to be secured. However, BYOD and enterprise mobility have changed all that. There are now a number of...

  • App permissions can be used to exploit your data

    October 24, 2018 • Security, Top StoriesComments Off on App permissions can be used to exploit your data

    Every time an application is installed on a device, the user is asked to allow that app certain permissions. These range from being able to view your contacts, to using your camera and microphone, tracking your location, and many, many more. While some of...

  • What to know before giving into ransom demands

    What to know before giving into ransom demands

    October 18, 2018 • SecurityComments Off on What to know before giving into ransom demands

    Despite small and medium enterprises (SMEs) becoming increasingly popular targets for cybercriminals, many remain completely unprotected in this regard. As a result, when faced with a ransomware attack, there is often a lack of preparation and awareness...

  • Top 7 tips for protecting your Smart TV

    Top 7 tips for protecting your Smart TV

    October 9, 2018 • Top StoriesComments Off on Top 7 tips for protecting your Smart TV

    The final few months will likely be a busy time of year for people and cybercriminals will be no different as they continue to look for weak spots in networks. It’s holiday time, and maybe you’ve invited friends over and you plan to sit back and watch the...

  • Robert Lipovsky unpacks popular cyber threats

    Interview: Senior Malware Researcher at ESET unpacks popular cyber threats

    September 11, 2018 • People, Security, Top StoriesComments Off on Interview: Senior Malware Researcher at ESET unpacks popular cyber threats

    Cybercrime remains a looming threat in the ICT sector and doesn’t show any signs of slowing down. Cybercriminals continue to find new and sophisticated ways to override security protocols for malicious purposes. In 2017, we saw the rise of ransomware as...

  • Attackers exploit flaw in GDPR-themed WordPress plugin to hijack websites

    Could home appliances knock down power grids?

    September 11, 2018 • Opinion, SecurityComments Off on Could home appliances knock down power grids?

    Cybercriminals could rope internet-connected household appliances into a botnet in order to manipulate the demand side of the power grid and, ultimately, cause anything from local outages to large-scale blackouts, according to a study from a team of academics...

  • Five ways you a can create the perfect password and why you should

    Five ways you can create the perfect password and why you should

    August 17, 2018 • Features, Lists, Top StoriesComments Off on Five ways you can create the perfect password and why you should

    Stories of people being hacked online are becoming more common these days. Many people have had their accounts, whether Facebook or Twitter, compromised.  Avoiding these kinds of hacks means that one needs to use stronger passwords, but this won’t keep...

  • The risks mobile payments present to financial service

    The risks mobile payments present to financial service

    August 5, 2018 • Finance, Online & Social, Top StoriesComments Off on The risks mobile payments present to financial service

    It’s no secret that the financial services industry is a top target for cybercriminals looking to steal valuable data. In fact, data shows that financial firms face daily attacks that attempt to bypass defences protecting a growing number of attack...

  • How the Industry 4.0 era will change the cybersecurity landscape

    July 20, 2018 • Security, Top StoriesComments Off on How the Industry 4.0 era will change the cybersecurity landscape

    We’ve come a long way from the industrial revolution that saw the creation of steam engines and mechanised manufacturing completely transforming the world at the time. Then came electricity and later, IT-enabled manufacturing. Today we stand at the edge of...

  • Research reveals how criminals target fax machines to take over networks and spread malware

    Companies at risk of unauthorised access to critical data

    July 15, 2018 • Big Data, Security, Southern Africa, Top StoriesComments Off on Companies at risk of unauthorised access to critical data

    Recent local cyberattacks are a forewarning of things to come and it clearly shows the vulnerabilities of South African companies. Although in recent attacks customers have not necessarily suffered any financial losses, this could quickly change with personal...

  • Are your employees your greatest cybersecurity risk?

    June 7, 2018 • Opinion, SecurityComments Off on Are your employees your greatest cybersecurity risk?

    Your employees provide some of the most useful access points into your business for cybercriminals. Knowing who is most likely to be targeted, and it may not be the most obvious people, will help the organisation put the right security measures in place....

  • The rise of Multi-Factor Authentication

    10 Cybersecurity Myths That Must Be Busted

    May 24, 2018 • Security, SponsoredComments Off on 10 Cybersecurity Myths That Must Be Busted

    As we share massive amounts of information over the Internet, protecting our private data seems like a real challenge. Let’s not forget the fact that every step that you make online is watched by all kinds of snoopers: governments, ISPs (Internet Service...