Stop navel-gazing at encryption
We are so enthralled by our own brilliance in cryptography that we forget that most data at rest - tucked away inside databases - is unencrypted. By Lori MacVittie, principal technical evangelist at F5 Networks Case in point, a Skyhigh analysis of encryption controls...
Trend Micro software blocks 5m camera hack attempts
Trend Micro says it has blocked 5-million attempted cyberattacks against IP cameras in just five months. Through its strategic partnership with global IP security solution provider Vivotek, Trend Micro's IoT security solutions are embedded in globally deployed IP...
Certified protection to counter banking malware threats
These days, there isn't much that can't be done on mobile, and that includes banking. For many people, banking apps are the go-to method of managing finances. As a result, mobile banking malware targeting Android phones has become a serious and somewhat underestimated...
Build a human firewall to fight human errors
With Kaspersky research showing 970 557 phishing attacks detected in South Africa in Q1 2019 alone - an average of 10 783 per day - and 53 829 mobile malware attacks in the same period - an increase of 6% compared to Q1 2018 - one has to ask how vulnerable companies...
Strengthening cybersecurity with a zero trust approach
In response to sophisticated and targeted cyberattacks, organisations have begun to shift their focus to proactive strategies that employ advanced cybersecurity technology and techniques. Threat Hunting, a strategy for investigating potential threats before they cause...
Check Point debuts Malware DNA
Check Point Software Technologies has introduced a new artificial intelligence-based malware detection engine to its SandBlast Network threat prevention solution, to enable even faster, more accurate prevention of malicious attacks. The new Malware DNA engine...
Kaspersky enables machine learning to protect against advanced threats
Kaspersky Internet Security for Android has been strengthened with a new feature for combating the evolving malware landscape - Cloud ML for Android. The new feature, based on machine learning technology, ensures immediate proactive detection of advanced and...
Protecting cryptocurrency in Africa
With bitcoin experiencing a price rally recently, interest in this and other cryptocurrencies are regaining momentum. The potential disruption from these digital currencies, especially in Africa, can be significant for traditional financial service providers. However,...
LoudMiner uses virtualisation software to mine cryptocurrency
ESET researchers have discovered an unusual cross-platform cryptocurrency miner called LoudMiner. LoudMiner uses virtualization software - QEMU (short for Quick Emulator) on macOS and VirtualBox on Windows - to mine cryptocurrency on a Tiny Core Linux virtual machine....
Four essential cloud security concepts
Possibly the most important attribute of the cloud is that critical business applications, can be deployed, managed, and distributed faster and easier than by any other method, giving employees and customers real-time access to critical information--wherever they are...
BT enhances its cyber capabilities in Europe
BT has announced the opening of a new Cyber Security Operations Centre (Cyber SOC) in Paris, as well as announcing upgraded facilities, new customer solutions and recruitment at its existing SOCs in Madrid and Frankfurt. BT’s global network of Security Operations...
Imperial College protects research data with software-defined storage
Solutions from ArcaStream and Excelero are part of a new software-defined storage deployment at Imperial College London, one of the world's leading university research centres for science, engineering, medicine and business. By moving to a single high-performance...