Oct 11, 2017
“Open” WiFi is available almost everywhere, but different cities have their own implementation strategies — and its important to make smart security choices, writes Brendan McAravey, country manager at Citrix South Africa. While cities like Cape Town...
Oct 9, 2017
Phishing is the term used when a cybercriminal sends some sort of electronic message to trick one into doing something doubtful. The “fishing” metaphor refers to the impression of getting one on the hook and then reeling one in, writes Harrish Chib,...
Oct 2, 2017
A dangerous Android banking trojan that was first reported by ESET earlier this year has found its way to Google Play, now stealthier than ever. Dubbed BankBot, the banking trojan has been evolving throughout the year, resurfacing in different versions on and outside...
Sep 28, 2017
Ideco has unveiled its next generation identity assurance ecosystem, designed to deliver what is describes as fraud-proof trusted identity authentication, confirmed with a digital certificate of authenticity in seconds. Ideco’s new Identity-as-a-Service (IDaaS)...
Sep 27, 2017
The Internet of Things (IoT) is rapidly expanding to include a previously undreamed of amount of connected devices – cars, toys, medical devices, home appliances – and all these smart things connecting to the Web have to be secured. Unfortunately, security...
Sep 27, 2017
Fortinet urges caution regarding a new Bluetooth exploit, known as BlueBorne, that has been discovered to exploit a number of Bluetooth vulnerabilities, making billions of devices potentially vulnerable to attack.While there is no evidence that such attack vectors...