subscribe: Daily Newsletter

 

ESET works with Google to halt malwar...

ESET has launched Chrome Cleanup, a new scanner and cleaner for Google Chrome designed to help users browse the web...

posted on: Oct 18, 2017 | author: Allan Davison

Outwit cyber opponents with integrate...

Even though cyber security has been put under the microscope, and in spite of years of experience and cyber security...

posted on: Oct 18, 2017 | author: Allan Davison

Capture the Flag whitehat contest ope...

Kaspersky Lab has announced the international industrial Capture the Flag (CTF) security competition, offering...

posted on: Oct 5, 2017 | author: Allan Davison

Endpoint detection and response pilot...

The persistent nature of advanced threats requires enterprises to re-evaluate their cybersecurity ecosystems, putting...

posted on: Oct 5, 2017 | author: Allan Davison

Intact introduces vulnerability and p...

Security specialist Intact Software Distribution is adding vulnerability and penetration testing to its range of...

posted on: Oct 4, 2017 | author: Allan Davison

Check Point extends security to Azure

Check Point Software Technologies has announced that its flagship vSEC cloud security solution for Microsoft Azure has...

posted on: Oct 3, 2017 | author: Allan Davison

Intact Software Distribution adds Ver...

Specialist security solutions distributor Intact Software Distribution has added Veriato’s range of intelligent...

posted on: Oct 2, 2017 | author: Allan Davison

Aruba modernises network security

Aruba, a Hewlett Packard Enterprise company, has announced the Aruba 360 Secure Fabric, a security framework that...

posted on: Sep 29, 2017 | author: Allan Davison

ESET launches Privacy Protection Solu...

ESET South Africa has launched ESET Privacy Protection Solutions. These are tools that an organization can use to...

posted on: Sep 28, 2017 | author: Allan Davison

Attackers abuse document software

Kaspersky Lab experts have discovered a feature in popular document-creation software that has been abused by...

posted on: Sep 27, 2017 | author: Allan Davison

Arbor releases new version of DDoS de...

As Distributed Denial of Service (DDoS) attacks continue to rise dramatically in size, frequency and complexity, it...

posted on: Sep 27, 2017 | author: Allan Davison

Aruba modernises network security

Aruba, a Hewlett Packard Enterprise company, has announced the Aruba 360 Secure Fabric, a security framework that...

posted on: Sep 26, 2017 | author: Allan Davison

Companies must became cyber-resilient

This year, we have seen some of the most high-profile victims of cybercrime across the world, including the NHS in the...

posted on: Oct 17, 2017 | author: Allan Davison

Securing the cloud in a complex threa...

Although cloud computing can be counted as one of the biggest trends of the moment, it is presenting data and security...

posted on: Oct 13, 2017 | author: Allan Davison

Protect your home from digital attack...

Modern connected homes come with risks — unprotected home WiFi can be hacked into, with some dangerous...

posted on: Oct 13, 2017 | author: Allan Davison

Save yourself from hacker headaches

“Open” WiFi is available almost everywhere, but different cities have their own implementation strategies...

posted on: Oct 11, 2017 | author: Allan Davison

Why Africans need to understand phish...

Phishing is the term used when a cybercriminal sends some sort of electronic message to trick one into doing something...

posted on: Oct 9, 2017 | author: Allan Davison

Banking Trojan returns to Google Play

A dangerous Android banking trojan that was first reported by ESET earlier this year has found its way to Google Play,...

posted on: Oct 2, 2017 | author: Allan Davison

Ideco launches ‘foolproof’...

Ideco has unveiled its next generation identity assurance ecosystem, designed to deliver what is describes as...

posted on: Sep 28, 2017 | author: Allan Davison

Security in an increasingly connected...

The Internet of Things (IoT) is rapidly expanding to include a previously undreamed of amount of connected devices...

posted on: Sep 27, 2017 | author: Allan Davison

BlueBorne may affect billions of devi...

Fortinet urges caution regarding a new Bluetooth exploit, known as BlueBorne, that has been discovered to exploit a...

posted on: Sep 27, 2017 | author: Allan Davison

Strengthening the human weakness

Insider threats are one of the trickiest threats to detect and fight effectively, and are a top concern for businesses...

posted on: Sep 27, 2017 | author: Allan Davison

Mobile network security calls for new...

It has become more common these days to hear about the latest security breach or denial of service (DOS) attack, which...

posted on: Sep 20, 2017 | author: Allan Davison

Mobile devices: even attacks are gett...

When it comes to mobile devices, things are getting more personal, including attacks. Contact lists, emails and text...

posted on: Sep 18, 2017 | author: Allan Davison

« Previous Entries