How much is your stolen card worth on the dark web?

According to recent research from NordVPN, prices for stolen payment cards on dark-web marketplaces have risen in most countries. While the global average remains around $8, some markets have jumped by as much as 444%. In South Africa, the average price climbed from...

Why aren’t we deploying AI data centres at scale?

Kathy Gibson reports from Tognana, Italy – Data centres are the engines of innovation, but face massive challenges to keep up with growing demands from artificial intelligence (AI), power and cooling issues, staffing shortages and sustainability imperatives. A panel...

Europe stands united in data centre race

Kathy Gibson reports from Tognana, Italy - Europe is standing as one in the development of a globally competitive data centre industry. At a meeting of Data Centre Associations hosted by Vertiv, industry leaders came together to identify common issues and areas of...

Cybercrooks are coming after your data and your money

Kathy Gibson reports - Cybercriminals are interested in your data and your money, and they are becoming increasingly good at getting their hands on both. The 2025 Microsoft Digital Defense Report reveals that data is the adversaries’ primary focus area, closely...

How Africa can seize the AI advantage

Kathy Gibson reports – Realising the potential of artificial intelligence (AI) for Africa requires commitment and hard work. This is the word from Kabelo Makwane, country manager of Google South Africa, addressing delegates to the Google AI in Action event taking...

Subglacial flood bursts through Greenland ice sheet

Using data from several Earth-observing satellites, including ESA’s CryoSat and the Copernicus Sentinel-1 and Sentinel-2 missions, scientists have discovered that a huge flood beneath the Greenland Ice Sheet surged upwards with such force that it fractured the ice...

Tech to the rescue for near-extinct bears

Biodiversity conservation and human-wildlife co-existence are key priorities for the team at Abruzzo, Lazio and Molise National Park, in the Apennine Mountains of Italy, where the Marsican brown bear is among the park’s residents. To protect and preserve the bear – a...

China outperforms on smartphone market growth

According to preliminary data from the International Data Corporation (IDC) Worldwide Quarterly Mobile Phone Tracker, China's smartphone market shipped 71,6-million units in 1Q25, a 3,3% year-on-year (YoY) increase. This growth was driven by the government subsidies...

Beware of phishing attacks through SVG image files

Kaspersky has detected a new trend with attackers distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files – a format commonly used for storing images. Opening these files leads a user to phishing pages...

AMD hits TSMC N2 product silicon milestone

AMD’s next-generation AMD EPYC processor, codenamed “Venice”, has become the first HPC product in the industry to be taped out and brought up on the TSMC advanced 2nm (N2) process technology. This marks a major step forward in the execution of the AMD data centre CPU...

China’s tech self-reliance accelerates amid sanctions

Geopolitical tensions and domestic challenges are accelerating China's push toward technological self-sufficiency. As US sanctions intensify, China is doubling down on innovation across artificial intelligence (AI), semiconductors, robotics, and 5G. Strategic...

DDoS attacks show contrasting patterns across southern Africa

A new NetScout Threat Intelligence Report, for July to December 2024, reveals a complex and contrasting distributed denial of service (DDoS) attack landscape across southern Africa. According to the report, South Africa, Mauritius and Angola were among the most...

How employees are becoming threat actors

The adoption of artificial intelligence (AI) is accelerating across the business landscape as organisations aim to reap its potential benefits. However, recent incidents involving AI leaking corporate data show that embracing AI comes with a risk, as employees using...

Ransomware still a major threat for SMEs

Small businesses are still a prime target for cybercrime, with ransomware remaining a primary existential cyber threat to SMEs. According to the Sophos Security Operations Threat Research Annual Threat Report, ransomware cases accounted for 70% of Sophos Incident...

More News Today

Budget delivers temporary reprieve, but danger still looms

A challenging economic environment and severe fiscal pressure meant that the duty of delivering the 2024 National Budget Speech in a critical election year was guaranteed to be a sweat-inducing task. By Dondo Mogajane, CEO of the Moti Group With debt warning bells...

Xero and Sumday enhance carbon accounting for advisors

Xero has announced a global partnership with advisor-first carbon accounting platform Sumday to help accountants and bookkeepers globally to manage their own and their clients' carbon accounting. As part of the partnership, Xero and Sumday will work together to...

SA’s bumpy road to meeting international best practice

It has been a year since the grim reality of South Africa's greylisting status by the Financial Action Task Force (FATF). By Gabi Richards-Smith, partner, Kirsten Wolmarans, partner, Rashaad Carrim, partner and Lerato Lamola, associate director of Webber Wentzel While...

From frictionless to FrictionZero in business travel

In an age where even the brief wait for a coffee feels too long, the business travel scene is undergoing a radical transformation. Welcome to the era of FrictionZero Travel, where the concept of 'waiting' is as outdated as fax machines. This shift isn't just about...

How to navigate the fusion of GenAI and digital defence

The convergence of Generative AI (GenAI) and cybersecurity has emerged as a critical battleground amid ongoing digital transformation. Mandla Mbonambi, CEO of Africonology, asserts that in this dynamic intersection, cybersecurity professionals stand at the forefront,...

When is sharing oversharing on social media?

The recent "get to know me" trend on Instagram and TikTok may seem harmless, but cybersecurity experts have warned of the potential pitfalls of giving away too much of your personal information, particularly as it makes it easier for hackers to compromise your...

Deception technology crucial to unmasking the silent theft of data

The "silent theft" of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation. By Iniel Dreyer, MD of Data...

Huawei Cloud Summit looks to AI-ready infrastructure

This year's Huawei Cloud Summit, with the theme of "Accelerate Intelligence with Everything as a Service", saw the launch 10 AI-oriented innovations and extensive industry expertise of Pangu models. The objective is an AI-ready infrastructure tailored to each industry...

Lenovo tackles telco transformation with Edge AI

Lenovo has unveiled next-generation Integrated Edge AI Solutions for Telco that help enterprises go beyond the data centre to harness vast bodies of data at the far edge for transformative AI applications at scale while reducing energy consumption. To support the...

Dell adds AI experiences to modern workspaces

Dell Technologies is set to introduce a portfolio of commercial AI laptops and mobile workstations designed to bring organisations and employee productivity into the AI era. "The next generation of PCs is emerging at a pivotal time - with upcoming refresh cycles and...

Personal Share Portfolio Business Analyst

The purpose of the role is to plan, design, develop and launch Personal Share Portfolios (PSP) and associated business processes across the Investment platform.Key responsibilitiesEnsuring continual appreciation of the broader business context by understanding...

Digital Strategist – Gauteng Johannesburg Region

We're looking for strong Digital Strategists to lead performance marketing strategies across CRM, content, paid media, and automation. Bring the thinking that connects digital activity to real business outcomes. As a Digital Strategist at The Agency, you'll shape and...

Personal Share Portfolio Business Analyst – Gauteng Johannesburg

The purpose of the role is to plan, design, develop and launch Personal Share Portfolios (PSP) and associated business processes across the Investment platform.Key responsibilitiesEnsuring continual appreciation of the broader business context by understanding...

Senior Test Analyst

Our Client, a leading and established organisation, is looking for someone with a strong eye for quality and a solid grasp of Agile Testing in fast-moving, DevOps-aligned teams. This Senior Automation Tester role will suit a test analyst who enjoys being hands-on with...

IT Support Engineer

We are a leading Managed Service Provider (MSP) with an expanding client base and a great team. We currently have several openings due to expansion and we are looking for skilled, dynamic, and passionate IT Support Engineers to join our technical team in Johannesburg,...

Senior Test Analyst – Western Cape Cape Town Region

Our Client, a leading and established organisation, is looking for someone with a strong eye for quality and a solid grasp of Agile Testing in fast-moving, DevOps-aligned teams. This Senior Automation Tester role will suit a test analyst who enjoys being hands-on with...

IT Support Engineer – Western Cape Cape Town CBD

We are a leading Managed Service Provider (MSP) with an expanding client base and a great team. We currently have several openings due to expansion and we are looking for skilled, dynamic, and passionate IT Support Engineers to join our technical team in Johannesburg,...

National Technical Support Administrator and Technical Coordinator

General Summary: The position calls for a vibrant, passionate, and dedicated office administrator with sufficient knowledge to administer service, sales and spares while assisting the National team in selling and servicing all rental installations distributed by...

Reporting & Data Analyst – 12 months

Requirement Gathering: Engage with business stakeholders to understand and document reporting needs. Report Development: Create dashboards and reports directly using internal systems or coordinate with external system vendors to fulfil reporting needs. Data...

View more career listings on our Careers Section