Malicious Emotet trojan doing the rounds
A malevolent new trojan is doing the rounds: Emotet is reported to dwarf the impact of WannaCry and NotPetya which made headlines in 2018 for multimillion dollar losses incurred to businesses across the globe. This is according to Linda Morris of Smart Technology...
Kaspersky helps secure bionic technologies
Kaspersky Lab experts investigating the experimental cloud infrastructure for advanced bionic prostheses have identified several previously unknown security issues that could enable a third party to access, manipulate, steal or even delete the private data and more of...
Next-gen cybersecurity from Sophos Central Management
Sophos has announced that the next-gen Sophos XG Firewall is now available through Sophos Central, bringing Sophos' complete portfolio of cybersecurity solutions into a single, cloud-based management platform. Sophos partners and customers are now able to manage their...
Don’t underestimate the challenge of securing SD-WAN
Historically, the branch office of an organisation was the red-headed stepchild of the network, but digital transformation has changed all of that. By Doros Hadjizenonos, regional sales director for Fortinet in South Africa Today, transactions, workflows,...
Five-star peer-review rating for Fortinet
Fortinet network security products deliver outstanding functionality, ease of implementation and excellent cost-benefits. This is according to dozens of Fortinet customers from across the economic spectrum who posted their evaluations of the products on the Gartner...
The murky waters of Android banking malware
Banking malware continued to plague the Android platform throughout 2018, with cybercrooks relentlessly targeting users with banking trojans and fake banking apps, but also experimenting with new money-stealing techniques. To help users navigate the tricky and...
Why cybersecurity is vital to business strategies in 2019
Relentless cyber criminals are becoming smarter and more resourceful by the day. 2018 taught us many lessons and one of them is that companies cannot afford to develop business strategies without cybersecurity being at the heart of it. By Clayton Naidoo, GM for Cisco...
Why you should use a pseudonym at Starbucks
Innocently providing your name at your local coffee shop is just an example of how easy it can be for miscreants to cut through the 'privacy' of social media accounts, says Carey van Vlaanderen, CEO at ESET South Africa. When Starbucks introduced personalising the...
Communication missing in physical and IT security integration
Better communication is the key to integrating physical and IT security in enterprises today. This is according to Charl Ueckermann, CEO at AVeS Cyber Security, who says physical and IT security resources have traditionally been treated as separate disciplines. As...
Kaspersky Lab automates training platform
In 2017, 59% of South African companies attributed weaknesses in their IT security strategy to the careless actions of employees. With staff training seen as an important way to reduce cybersecurity incidents, finding the most efficient approach remains a pain point...
Naspers warns of e-book scam
The Naspers Group has been made aware of a scam targeting members of the South African public. Victims of the scam receive an e-book via social media channels such as WhatsApp and Telegram, which describes Naspers as "a registered online trading platform". As part of...
Security predictions for 2019
NetScout Arbor, which specialises in advanced distributed denial of service (DDoS) protection solutions, has released its security predictions for this year, against a background which saw the largest ever DDoS attacks being unleashed in 2018. Bryan Hamman, territory...