Friday, June 13, 2025
No menu items!

Security Online

How to Be Safe From the “Reset Password” Email Scam

Most online services have built-in security systems that alert employees when the systems detect “unusual” activity on their accounts. For example, legitimate email services or similar will send notifications about attempts to reset the phone number and e-mail address linked...

Beware: These Are The Top 10 Brands Imitated in Phishing Attacks

Check Point Research (CPR), the Threat Intelligence arm of Check Point Software Technologies, a leading provider of cyber security solutions globally, has published its new Brand Phishing Report for Q3 2021. The report highlights the brands which were most frequently...

Is South Africa a Playground for Cybercriminals?

The Attacks From All Angles 2021 Mid-year Cybersecurity Report by Trend Micro highlighted a 47% year-on-year increase in email threats as well as malicious files and URLs in the first quarter of 2021 globally. South Africa’s technology landscape is almost...

Is Cybersecurity as Necessary as Electricity?

Cybersecurity has become as much a business necessity as having electricity says South African financial services and insurance company, Sanlam. Threat actors are constantly evolving and relentlessly hunting for vulnerabilities, cybercrime has become so profitable that exploitation is their business...
- Advertisement -spot_img

Latest News

TECNO and itel Present Tech Gifts Ideas for Father’s Day 2025

Father’s Day is around the corner, on 15 June. It is a time to celebrate, honor, and appreciate the...
- Advertisement -spot_img