May 8, 2015
The first quarter of 2015 saw the revelation of the most sophisticated advanced persistent cyberespionage threat to date: Equation. The Death Star of the Malware Galaxy and linked to the infernal Stuxnet and Flame super-threats, its first known sample dates back to...
May 7, 2015
Crime rates in South Africa are expected to continue their upward climb as economic and social conditions deteriorate – a trend that is already being evidenced in the sharp climb in truck and car hijackings. As economic growth contracts, unemployment figures...
May 5, 2015
The world is a new place – social networks are no longer fads for youngsters but have evolved into valuable business tools for the modern business. They include rich applications, real time interactions and all the user generated content you can consume. Local IT...
May 5, 2015
There is a disconnect between business and the IT department, as most executives on the ‘business’ side don’t fully grasp the very real risks posed by today’s advanced cyber threats. Coupled with this, the technical department too often doesn’t have the influence...
May 5, 2015
While a plethora of new payment solutions are coming to market, businesses should be cautious about moving to new solutions just for the sake of it, Jonas Thulin, security consultant at Fortinet. Customers are driving a great deal of change in how transactions are...
May 5, 2015
Ransomware is malicious software that cyber criminals use to hold a user’s computer or computer files for ransom, demanding payment in order for the user to get the files back. Sadly, ransomware is becoming an increasingly popular way for malware authors to extort...