Apr 4, 2014
In the history of malware writing and malware hunting, there are a number of unusual stories involving programmes which looked like typical malware – but did nothing more damaging than putting a smile on users’ faces. In a few extraordinary cases, viruses were...
Mar 31, 2014
Today, most businesses are run on computers. Owning a computer, accessing e-mails, surfing the Internet, interacting on social media sites and being connected to a network all carry the threat of attacks from malicious programmes and viruses, says Roberto Caprio, MD,...
Mar 27, 2014
The South African farming community faces a number of unique challenges. The very nature of farms, which can comprise of hundreds or even thousands of hectares of geographically dispersed land, makes monitoring them a difficult task, even when the farm owner or...
Mar 26, 2014
There is a long list of consumer devices that can be hacked and the information used to access corporate or personal data. Since the Black Hat security conference in September 2013, the toilet has now been added to that list, and if something as innocuous and...
Mar 20, 2014
Trend Micro has boosted protection against cyber-attacks via mobile platforms by unveiling a new set of security solutions. The new solutions will help mitigate threats to mobile networks and devices, including product enhancements to support enterprises and...
Mar 20, 2014
Biometric identification systems have grown in popularity as more company use fingerprint, face, iris or voice recognition as part of their risk management strategies, says Marius Coetzee, MD at Ideco Biometrics.A market that was once dominated by fingerprint...