Tuesday, March 5, 2024
No menu items!

cybercriminals

Are we prepared to face 2019’s cyber security challenges?

"Technology is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other," wrote novelist and scientist C. P. Snow in the New York Times in 1971. It still rings...

Connected car chargers could leave home networks vulnerable

While modern electric vehicles are tested constantly for vulnerabilities, some of their essential accessories, such as the battery chargers, often remain neglected. Kaspersky Lab experts have discovered that electric vehicle (EV) chargers supplied by a major vendor carry vulnerabilities...

Biometrics has a keen stake in the war on identity fraud

Identity fraud remains one of the most prominent cybercrime threats of modern society today. Global research notes that on average businesses loose over US$ 200 billion every year – while consumers loose more than US$ 16 billion due to...

Endpoint Detection and Response – the best way to do it

Endpoint protection is one of the primary considerations for cybersecurity. There was a time when on-premise desktop computers were the only thing that had to be secured. However, BYOD and enterprise mobility have changed all that. There are now a...

App permissions can be used to exploit your data

Every time an application is installed on a device, the user is asked to allow that app certain permissions. These range from being able to view your contacts, to using your camera and microphone, tracking your location, and many,...

What to know before giving into ransom demands

Despite small and medium enterprises (SMEs) becoming increasingly popular targets for cybercriminals, many remain completely unprotected in this regard. As a result, when faced with a ransomware attack, there is often a lack of preparation and awareness around the...

Top 7 tips for protecting your Smart TV

The final few months will likely be a busy time of year for people and cybercriminals will be no different as they continue to look for weak spots in networks. It’s holiday time, and maybe you’ve invited friends over...

Interview: Senior Malware Researcher at ESET unpacks popular cyber threats

Cybercrime remains a looming threat in the ICT sector and doesn't show any signs of slowing down. Cybercriminals continue to find new and sophisticated ways to override security protocols for malicious purposes. In 2017, we saw the rise of ransomware...

Could home appliances knock down power grids?

Cybercriminals could rope internet-connected household appliances into a botnet in order to manipulate the demand side of the power grid and, ultimately, cause anything from local outages to large-scale blackouts, according to a study from a team of academics...

Five ways you can create the perfect password and why you should

Stories of people being hacked online are becoming more common these days. Many people have had their accounts, whether Facebook or Twitter, compromised.  Avoiding these kinds of hacks means that one needs to use stronger passwords, but this won’t keep...
- Advertisement -spot_img

Latest News

APO Group Appoints New Chief Operating Officer (COO)

APO Group, the premier Pan-African communications consultancy and press release distribution service, is excited to announce the appointment of...
- Advertisement -spot_img