Prevent your WhatsApp account from being hacked

A user’s messaging app account might be of interest not only to jealous spouses and nosy coworkers, but also to cybercriminals. Stolen WhatsApp accounts are used for various types of criminal activity, ranging from spam distribution to sophisticated scam...

Legislation tightens cyber defences for financial services

Automated processes across banking, financing, insurance and other financial services are dependent on complex infrastructures that span both on-premises data centres and cloud service providers. This dependency on third-party service providers and technology vendors...

Insights on AI-enabled cybercrime

Over the last year, discussions about AI-enabled cybercrime have shifted from speculation about impacts to real-world observations, writes Derek Manky, chief security strategist and global vice-president: threat intelligence at Fortinet. Malicious actors continue to...

As AI unleashes new threats, we need a new cybersecurity approach

Imagine coming to the end of a lengthy recruitment process, only to find out the candidate you’ve been dealing with during several rounds of in-depth interviews isn’t real. By Yash Pillay, sales engineer at Trend Micro In fact, the person you’ve just hired doesn’t...
How you could thrive without passwords

How you could thrive without passwords

The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals, writes By Kumar Vaibhav, lead senior solution architect:...
The role of advanced technologies in ransomware recovery

The role of advanced technologies in ransomware recovery

The threat of ransomware attacks looms large, compelling organisations to rethink their data management strategies. By Modeen Malick, principal systems engineer at Commvault As businesses increasingly adopt cloud technologies, the complexities of maintaining...