How to combat mobile malware threats

Mobile malware and vulnerabilities have been making headlines well over the past year, and attacks are becoming a more common way for cybercriminals to steal sensitive data, writes Rick Rogers, area manager for east and west Africa at Check Point Software...

The darker reality of the make-believe gaming world

Chaos recently erupted in Taiwan when a stampede of Pokémon Go players all rushed to catch a rare Pokémon called Snorlax. This huge, bipedal, dark blue-green Pokémon with a cream-colored face, belly, and feet caused quite a commotion when the players ran through the...

Why financial institutions can take the fight to cybercriminals

As a highly targeted sector, financial services organisations are also in the best place to display best practice in terms of resisting future attacks, says Martin Walshaw, senior engineer at F5 Networks. Cyber fraudsters are winning the battle when it comes to...

Educational institutions under threat

Like any business, educational institutions are increasingly dependent on the internet and technology to conduct daily activities, from online learning and test platforms, to storing sensitive student and employee information.  A data breach or cyber-attack can...

Filling the IoT connectivity and security gaps

Internet of Things (IoT) devices are a critical component of the new digital economy, collecting and sharing information about a myriad of things – from smart appliances, irrigation systems and shipping containers, to wireless energy meters and mobile healthcare...

Russian hack highlights the threat landscape

No one is safe and any organisation is fair game, says Martin Walshaw, senior engineer at F5 Networks. The World Anti-Doping Authority (WADA) released the name of the hacker group that exposed sensitive and personal information on four top American athletes, Serena...