Kaspersky Lab remembers ‘benign’ malware

In the history of malware writing and malware hunting, there are a number of unusual stories involving programmes which looked like typical malware – but did nothing more damaging than putting a smile on users’ faces. In a few extraordinary cases, viruses were...

Protecting against CryptoLocker

Today, most businesses are run on computers. Owning a computer, accessing e-mails, surfing the Internet, interacting on social media sites and being connected to a network all carry the threat of attacks from malicious programmes and viruses, says Roberto Caprio, MD,...

CCTV monitoring in poor bandwidth conditions

The South African farming community faces a number of unique challenges. The very nature of farms, which can comprise of hundreds or even thousands of hectares of geographically dispersed land, makes monitoring them a difficult task, even when the farm owner or...

The corporate toilet: a hacking hotspot

There is a long list of consumer devices that can be hacked and the information used to access corporate or personal data. Since the Black Hat security conference in September 2013, the toilet has now been added to that list, and if something as innocuous and...

Trend Micro grows mobile security solutions

 Trend Micro has boosted protection against cyber-attacks via mobile platforms by unveiling a new set of security solutions. The new solutions will help mitigate threats to mobile networks and devices, including product enhancements to support enterprises and...

Biometric protection the future of security

Biometric identification systems have grown in popularity as more company use fingerprint, face, iris or voice recognition as part of their risk management strategies, says Marius Coetzee, MD at Ideco Biometrics.A market that was once dominated by fingerprint...