The science behind DDoS extortion

“Pay up or we’ll take your Web site down.” So goes the adage that usually accompanies ransom-based cyber-attacks, says Bryan Hamman, territory manager – sub-Saharan Africa at Arbor Networks. Top of the news agenda in recent weeks, well-known names...

Facebook Messenger privacy issues

Users of the iPhone and Android versions of Facebook’s app will have found that, when trying to get into messenger, they are directed to download a second app, Messenger that will allow you person-to-person messages. This has left many users in a bind, as without...

Kaseya acquires Scorpion Software

Kaseya, the leading provider of cloud-based IT management software, today announced the acquisition of Scorpion Software, a leading security and authentication provider offering integrated two factor authentication, single sign on and password management solutions....

Combat crime with new wireless alarm

Crime is on the increase and millions of South Africans cannot afford fully-fledged security and alarm systems, backed-up by armed response. Wireless communications specialist TruTeq Devices has launched the most affordable plug ‘n play wireless security...

BlackBerry platform wins STIG approval

BlackBerry has announced that Secure Work Space for iOS and Android, a multi-platform containerisation solution managed through BlackBerry Enterprise Service 10 (BES10), has received Security Technical Implementation Guide (STIG) approval from the Defense Information...

IronTree offers Panda Cloud Fusion

IronTree has extended their range of cloud services to include Panda Cloud Fusion, delivering comprehensive security, management and support into one easy to use solution. This extends IronTree’s proposition adding protection and management to their already strong...