Combatting the ‘evil Internet of Things’

A recent survey of over 400 global IT security pros revealed that fears over the security of connected devices has risen sharply since last year, writes Peter Reid, executive head of Intervate. In all, 86% of respondents to security analysts Pwnie Express’ survey said...

Are contactless cards cloneable?

The security community has been demonstrating successful cloning of contactless transactions since at least 2012. Full cloning of cards is not possible, and current cloning methods can only rely on copying an out-of-date implementation of the contactless standard to...

Security is about planning for failure

As the world continues to become increasingly connected, organisations are faced with large quantities of data they need to protect and make sense of. International Data Corporation (IDC) predicts that 66% of CEOs will have digital transformation at the centre of...

The most common reasons for corporate data loss

There is no doubt that one of the main assets of a company is the data it stores. Information about its customers, financial or employee planning, among other types of records, should be adequately protected and available whenever they are needed. For this reason,...

Cross the security skills chasm

Cyber-attacks, like a big old snowball, continue to grow as it rolls down the mountain. And in its wake are the good guys aka security professionals who are struggling to keep pace.  The reality is cybercriminals and so-called hacktivists continue to deepen their...

Can banking fraud be solved?

Banking fraud is on a frightening up curve and it appears it is impossible for banks to stop it by themselves, said Tjaart van der Walt, MD of telecommunications and banking specialist TruTeq Group. Can this problem be solved at all? Yes. There are a number of...