How cybercriminals hide in your phone

While analysts figure out new methodologies for analysing malware and users begin to understand how all this works, cybercriminals are seeking new ways to hide in phones and compromise devices, says ESET Southern Africa. The convoluted tricks used to increase the...

Trends transforming the local security landscape

The South African security industry has been described as cutting-edge, comprising a number of segments from physical- to cybersecurity. The sector boasts a current growth rate of around 15% per annum, and is estimated (in its entirety, including commercial, industry...

Risks and rewards of meshing physical, cyber security

Security is undoubtedly a primary focus for any organisation, particularly in this digital age where assets extend beyond the physical to include virtual assets such as data. By Sanjay Vaid, practice director cyber risk security at Wipro The emergence of cloud or...

Safe as houses?

Information is an organisation’s most valuable asset. To protect that asset, it’s no longer viable that security is an external layer of core information management software. Security should be imbedded in the foundation of the software’s design. It...

Why you should protect data at all costs

It has long been said that ‘knowledge is power’ but never has that been more pertinent than it is for businesses today. What businesses know is a key differentiator as they seek to get closer to their customers and improve their own business processes...

What you need to know about IoT attacks

Something major happened in 2017. Internet of Things (IoT) devices were exploited by cybercriminals and turned into a rogue and malevolent army. A series of distributed denial of service (DDoS) attacks affected websites connected to the cloud-based internet...