MENU

Posts Tagged ‘cybercriminals’

  • Hosting company warns against domain hijacking

    Hosting company warns against domain hijacking

    March 14, 2019 • SecurityComments (0)

    Domain names can be stolen, held hostage and used to wreak havoc for a business website owner. Domain hijacking entails cyber criminals unlawfully gaining access to a website’s unique domain in order to impersonate the business for other illegal...

  • Tech support scams are up, warns Microsoft

    March 11, 2019 • SecurityComments (0)

    Hackers are always on the lookout for new ways to make more money. Cybercriminals have an impressive arsenal of tools to use in order to retrieve data or money from someone’s network. One of the methods that they are using far more often is the tech support...

  • What is the cyber security recipe for SMEs?

    What is the cyber security recipe for SMEs?

    January 24, 2019 • Security, StartupsComments Off on What is the cyber security recipe for SMEs?

    Small and medium-sized businesses are becoming more and more attractive targets for cybercriminals – both direct and also as a starting point for larger attacks across a supply chain. Unfortunately, these companies often lack the experts, systems and...

  • Preparing for the inevitable – what 2018 taught businesses about data protection

    January 22, 2019 • SecurityComments Off on Preparing for the inevitable – what 2018 taught businesses about data protection

    Around this time last year, commentators across the industry predicted that 2018 was going to be the ‘year of data protection’, and it was. Even halfway through the year, we had seen a number of high profile data breaches and the public’s...

  • Tapping into an open source eco-system critical in 2019

    January 21, 2019 • FeaturesComments Off on Tapping into an open source eco-system critical in 2019

    There are some big things set for 2019. Customer expectations continue to evolve, new technologies are developed to push the envelope and all of that leads to continuous transformation of our business, our people, our processes and of course, the technology...

  • Data security sits at the heart of democracy

    Data security sits at the heart of democracy

    January 15, 2019 • Security, Southern AfricaComments Off on Data security sits at the heart of democracy

    Military risks immediately spring to mind: a recent report found that even the Pentagon’s latest advanced military systems are vulnerable and can be “easily hacked”. The consequences for citizens of rogue military assets is unthinkable. But...

  • Cyber incidents, major risks for financial services -study

    Are we prepared to face 2019’s cyber security challenges?

    January 10, 2019 • SecurityComments Off on Are we prepared to face 2019’s cyber security challenges?

    “Technology is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other,” wrote novelist and scientist C. P. Snow in the New York Times in 1971. It still rings true today. Every new tool or technology we...

  • Connected car chargers could leave home networks vulnerable

    Connected car chargers could leave home networks vulnerable

    January 8, 2019 • SecurityComments Off on Connected car chargers could leave home networks vulnerable

    While modern electric vehicles are tested constantly for vulnerabilities, some of their essential accessories, such as the battery chargers, often remain neglected. Kaspersky Lab experts have discovered that electric vehicle (EV) chargers supplied by a major...

  • Biometrics has a keen stake in the war on identity fraud

    December 6, 2018 • SecurityComments Off on Biometrics has a keen stake in the war on identity fraud

    Identity fraud remains one of the most prominent cybercrime threats of modern society today. Global research notes that on average businesses loose over US$ 200 billion every year – while consumers loose more than US$ 16 billion due to identity fraud. In...

  • What we can expect from IT security in 2019

    Endpoint Detection and Response – the best way to do it

    November 7, 2018 • SecurityComments Off on Endpoint Detection and Response – the best way to do it

    Endpoint protection is one of the primary considerations for cybersecurity. There was a time when on-premise desktop computers were the only thing that had to be secured. However, BYOD and enterprise mobility have changed all that. There are now a number of...

  • App permissions can be used to exploit your data

    October 24, 2018 • Security, Top StoriesComments Off on App permissions can be used to exploit your data

    Every time an application is installed on a device, the user is asked to allow that app certain permissions. These range from being able to view your contacts, to using your camera and microphone, tracking your location, and many, many more. While some of...

  • What to know before giving into ransom demands

    What to know before giving into ransom demands

    October 18, 2018 • SecurityComments Off on What to know before giving into ransom demands

    Despite small and medium enterprises (SMEs) becoming increasingly popular targets for cybercriminals, many remain completely unprotected in this regard. As a result, when faced with a ransomware attack, there is often a lack of preparation and awareness...

  • Top 7 tips for protecting your Smart TV

    Top 7 tips for protecting your Smart TV

    October 9, 2018 • Top StoriesComments Off on Top 7 tips for protecting your Smart TV

    The final few months will likely be a busy time of year for people and cybercriminals will be no different as they continue to look for weak spots in networks. It’s holiday time, and maybe you’ve invited friends over and you plan to sit back and watch the...

  • Robert Lipovsky unpacks popular cyber threats

    Interview: Senior Malware Researcher at ESET unpacks popular cyber threats

    September 11, 2018 • People, Security, Top StoriesComments Off on Interview: Senior Malware Researcher at ESET unpacks popular cyber threats

    Cybercrime remains a looming threat in the ICT sector and doesn’t show any signs of slowing down. Cybercriminals continue to find new and sophisticated ways to override security protocols for malicious purposes. In 2017, we saw the rise of ransomware as...

  • Attackers exploit flaw in GDPR-themed WordPress plugin to hijack websites

    Could home appliances knock down power grids?

    September 11, 2018 • SecurityComments Off on Could home appliances knock down power grids?

    Cybercriminals could rope internet-connected household appliances into a botnet in order to manipulate the demand side of the power grid and, ultimately, cause anything from local outages to large-scale blackouts, according to a study from a team of academics...

  • Five ways you a can create the perfect password and why you should

    Five ways you can create the perfect password and why you should

    August 17, 2018 • Features, Lists, Top StoriesComments Off on Five ways you can create the perfect password and why you should

    Stories of people being hacked online are becoming more common these days. Many people have had their accounts, whether Facebook or Twitter, compromised.  Avoiding these kinds of hacks means that one needs to use stronger passwords, but this won’t keep...