How to ruin a cybercriminal’s day

Technology has changed the way we live, our relationships with others, and even how we take care of ourselves. These days, everyone – from the most inexperienced to the most advanced user – takes measures to protect themselves from cybercriminals seeking...

Trends that affect IT asset disposal

Smartphone technology is evolving rapidly, there have been vast improvements over the past few years and it is certainly not slowing down. The rise of smartphone technology continues to shape the way we live, work and play. Mobility has grown enormously with the...

The hunt for the dawn of APTs

The Moonlight Maze cyber-espionage attacks sent shockwaves through the US in the late 1990s – two decades later, researchers uncover the original attack tools and find a link to a modern APT. Kaspersky Lab and Kings College London researchers, looking for a link...

Ransomware is not only file encryption

Ransomware is an ever-increasing threat worldwide, claiming new victims on a regular basis with no end in sight. The Check Point threat intelligence teams unpacks the issue. While most ransomware families prevent the victims from accessing their documents, pictures,...

A decade of staying ahead of the security

Celebrating its tenth anniversary, SID’s David Liu looks back over the last decade and gives insight into the changes in the online security sector. What were you doing 10 years ago? Well, if you are South African, chances are you were listening to...

Companies need the unabbreviated truth about IT security

Information systems change all the time. Couple this with the fact that new threats arise constantly and it’s easy to see why security systems implemented or updated last month can’t keep pace with security requirements right now. The truth is that...