Preventing Petya – stopping the next ransomware attack

Check Point’s Incident Response Team has been responding to multiple global infections caused by a new variant of the Petya malware, which first appeared in 2016 and is currently moving laterally within customer networks. It appears to be using the...

Nigerian-phishing scammers are after IP and network plans

Attackers behind a recent surge in phishing and payment-interception attacks on industrial companies are also stealing victims’ project and operational plans, as well as diagrams of electrical and information networks, according to a report by Kaspersky...

The Fireball makes you WannaCry

J2 Software cautions that the recent cyber-attacks serve to emphasise one brutal fact: every organisation is vulnerable to cybercrime. John Mc Loughlin, J2 Software MD, notes that recognising this threat and planning to prevent it is the key to mounting a successful...

Ransomware: The only protection is user-education

Ransomware is a very real threat to businesses and individuals alike, and when it comes to online security, it is arguably the most damaging threat. Yet, many people still don’t know what ransomware is, even though this type of cyber threat has been aggressively...

Must-have Android privacy and security apps

NordVPN presents 10 must-have apps for your Android device to keep your data safe and private This year has seen some of the biggest hacks in history. For example, Yahoo, who admitted one of the largest breaches last year, announced about another hack in February,...

Personal information – take care before you share

Identity theft and fraud is a widespread global phenomenon that has gained considerable momentum in South Africa in the last decade. The internet and social media – combined with the naivety of the public in sharing personal information – have helped make...