Limiting the ransomware threat

Ransomware attacks, where a hacker uses malware that encrypts or locks an individual or businesses valuable files and systems, then demands a random to unlock them, is on the rise. These attacks have become commonplace, adding one more reason why consumers need to...

Condyn brings SearchInform to SA

Information security company SearchInform has partnered with Condyn to bring SearchInform’s next-generation data leak prevention technology to the South African and African market. The SearchInform data leakage prevention solution is about much more than...

Cyber-security in 2018: the big five

Cyber attacks have become something far greater than an embarrassing nuisance. As businesses are increasingly reliant on digital platforms for almost every aspect of their operations, an attack can cause everything from direct financial loss and brand damage, to...

Combating the seven swords of cybercrime

With automated tools and hackers for hire, cybercrime has turned into a game for profit, writes By Martin Walshaw, senior systems engineer at F5 Networks. Recent research from F5 Labs shows that out of 429 reported breaches studied between 2005 and 2017, hackers...

Meet the hackers …

Over the past year, every company in the world has experienced a mobile malware attack, according to a trends article from Check Point Software Technologies. Mobile malware has become a major concern for both consumers and organisations worldwide. Although much has...

How cybercriminals hide in your phone

While analysts figure out new methodologies for analysing malware and users begin to understand how all this works, cybercriminals are seeking new ways to hide in phones and compromise devices, says ESET Southern Africa. The convoluted tricks used to increase the...