Beware of the man in the middle

The motive for the vast majority of cybercrime is either to steal money or data. These attacks are sometimes small, targeting individuals, or sometimes massive, targeting large enterprises and stealing thousands of users’ details. In the majority of cases, attacks try...

IoT is already here

With 2014 being dubbed as the year of the Internet of Things (IoT), there are major concerns regarding the security and privacy issues that consumers face now, and potential problems they could have in the future, says Trevor Coetzee, regional director South Africa...

Fighting the new style of cybercrime

The nature of the cybercrime landscape is shifting. No longer are the main threats related to the theft of personal details and financial information – like capturing logon credentials, identity theft and stealing credit card data. Today’s most destructive breaches...

Malware hides in Android apps

A common piece of advice for Android users is to refrain from downloading applications from unknown sources. Although malware does show up at the Google Play store from time to time, it is much better controlled, than on other app stores, says Carey van Vlaanderen,...

Making the most of a CCTV solution

CCTV surveillance is becoming an increasingly popular addition to the security portfolios of both business and home users. The presence of CCTV not only acts as a deterrent for many would-be intruders, it also gives users themselves additional peace of mind that their...

Security in a mobile environment

Mobility is essential in the business world, as being able to communicate while on the move is no longer a “nice to have”, but a necessity, says Fred Mitchell, Symantec division manager, Drive Control Corporation. A variety of devices, including laptops,...