DDoS results in a buyers’ market
It's a buyers' market in the local property arena at the moment, according to certain industry experts. This is largely as a result of the slower economy, which has seen a rise in the number of properties for sale. Globally, it's a buyer's market as well when we look...
Rooting out malicious insiders
The danger of suffering a security breach has never been more of a reality for businesses across the board. Employees today access, process, and manage privileged data more than ever as part of their daily jobs, putting companies at risk of malicious activity,...
Mobile security: there’s a missing puzzle piece
With mobile malware and ransomware proliferating at a rapid rate, companies are recognizing the need for security technologies to protect network resources accessed by employees with their devices. But, they're missing an important piece of the puzzle. "A mobile...
ESET works with Google to halt malware
ESET has launched Chrome Cleanup, a new scanner and cleaner for Google Chrome designed to help users browse the web safely and without interruption. Chrome Cleanup will be available for all Google Chrome users running on Windows. As cyber-attacks become more complex...
Outwit cyber opponents with integrated threat intelligence
Even though cyber security has been put under the microscope, and in spite of years of experience and cyber security investments, organisations continue to struggle with security analytics and operations. This is the word from Arbor Network's territory manager for...
Companies must became cyber-resilient
This year, we have seen some of the most high-profile victims of cybercrime across the world, including the NHS in the UK, and the attack of Equifax that impacted of millions of people in several countries. The damage has not only cost companies' money, it has also...
Securing the cloud in a complex threat environment
Although cloud computing can be counted as one of the biggest trends of the moment, it is presenting data and security challenges, particularly in the complex threat landscape we live in today. Cloud brings a new consumption and delivery model that enables businesses...
Protect your home from digital attacks
Modern connected homes come with risks -- unprotected home WiFi can be hacked into, with some dangerous consequences. It becomes especially dangerous if the home is equipped with many connected IoT (Internet of Things) devices. Hacking into one would allow criminals...
Save yourself from hacker headaches
"Open" WiFi is available almost everywhere, but different cities have their own implementation strategies -- and its important to make smart security choices, writes Brendan McAravey, country manager at Citrix South Africa. While cities like Cape Town have implemented...
Why Africans need to understand phishing
Phishing is the term used when a cybercriminal sends some sort of electronic message to trick one into doing something doubtful. The "fishing" metaphor refers to the impression of getting one on the hook and then reeling one in, writes Harrish Chib, vice-president:...
Capture the Flag whitehat contest open
Kaspersky Lab has announced the international industrial Capture the Flag (CTF) security competition, offering participants the opportunity to hack a model of a real production site facility in an oil refinery. Finals will be held in Shanghai on 24 October. The CTF...
Endpoint detection and response pilot from Kaspersky
The persistent nature of advanced threats requires enterprises to re-evaluate their cybersecurity ecosystems, putting more focus to early identification of ongoing attacks and incident response. In a world where no network is completely secure, companies need to look...