Mobile users are in denial …

Leo Meyer, MD of Black Castle Technologies, gets under the covers with the mobile security denial syndrome. A myriad of polls over the last year have confirmed what we would expect; consumers don’t want their mobile devices to fall victim to security onslaughts....

The rise of biometrics in business

Biometrics may at the outset seem like a space-age, technology driven discipline, but using unique physical characteristics as identifying features is nothing new, writes Davina Myburgh, director of core credit for TransUnion Africa. Artefacts discovered in ancient...

Stronger banking security is needed

The financial services industry is under increased threat from cybercriminals who use ingenious methods to attack institutions and consumers. Cybercriminals are employing ever more sophisticated means to intercept online transactions and commit fraud. Banks, financial...

Who is behind industrial cyberattacks?

Over the past four months, more than 4 000 organisations globally have been targeted by cyberattacks which aim to infect their networks, steal data and commit fraud.  Many of these companies are leading international names in industries such as oil and gas,...

How effective is two-factor authentication?

Should a password get hacked, it could expose the user to viruses, malware and data breaches on their mobile phones and other devices. Clever cyber crooks have the skills and the tools to easily crack passwords and steal personal information. The default for all user...

DDoS and the ostrich syndrome

The so-called ostrich syndrome is a term used to describe people who prefer to “stick their heads in the sand”, much as an ostrich does, rather than accept some uncomfortable facts. However, when it comes to indisputable threats like Distributed Denial of...