Mobile users are in denial …
Leo Meyer, MD of Black Castle Technologies, gets under the covers with the mobile security denial syndrome. A myriad of polls over the last year have confirmed what we would expect; consumers don't want their mobile devices to fall victim to security onslaughts....
GIT debuts FLIR’s PTZ auto-tracking
Graphic Image Technologies (GIT) has announced the local availability of FLIR's PTZ (Pan/Tilt/Zoom) auto-tracking solution for Quasar CP-4221-301 PTZ cameras. This auto-tracking solution makes it possible to use a surveillance camera to automatically follow a moving...
The rise of biometrics in business
Biometrics may at the outset seem like a space-age, technology driven discipline, but using unique physical characteristics as identifying features is nothing new, writes Davina Myburgh, director of core credit for TransUnion Africa. Artefacts discovered in ancient...
Stronger banking security is needed
The financial services industry is under increased threat from cybercriminals who use ingenious methods to attack institutions and consumers. Cybercriminals are employing ever more sophisticated means to intercept online transactions and commit fraud. Banks, financial...
Kaspersky launches Free IoT device scanner
Kaspersky Lab has released a beta version of its solution for the "smart" home and the Internet of Things -- Kaspersky IoT Scanner. This free application for the Android platform scans the home Wi-Fi network, informing the user about the devices connected to it and...
Who is behind industrial cyberattacks?
Over the past four months, more than 4 000 organisations globally have been targeted by cyberattacks which aim to infect their networks, steal data and commit fraud. Many of these companies are leading international names in industries such as oil and gas,...
How effective is two-factor authentication?
Should a password get hacked, it could expose the user to viruses, malware and data breaches on their mobile phones and other devices. Clever cyber crooks have the skills and the tools to easily crack passwords and steal personal information. The default for all user...
Kaspersky offers secure connection freemium app
Kaspersky Lab has introduced its new freemium application, Kaspersky Secure Connection for Android, designed to protect user data transmitted via the Internet. This app's main feature is its adaptivity: for convenience and maximum user protection, traffic encryption...
Ignite and Sophos protect SMEs
Ignite, an internet and communication technology services provider focused on South African SMEs, has partnered with Sophos to offer next-generation cyber threat protection to South African small and medium enterprises (SMEs). The complete Sophos security portfolio...
DDoS and the ostrich syndrome
The so-called ostrich syndrome is a term used to describe people who prefer to "stick their heads in the sand", much as an ostrich does, rather than accept some uncomfortable facts. However, when it comes to indisputable threats like Distributed Denial of Service...
Kaspersky is a trail blazer in APT defence
A competitive analysis of the market for advanced persistent threats (APT) by the Radicati Group has awarded Kaspersky Lab's Anti Targeted Attack platform "Trail Blazer" quadrant status, one of its top market leadership positions. The result means that the product has...
F5 is Web Application Firewall magic quadrant
F5 Networks has been positioned by Gartner in the Leaders quadrant of its Magic Quadrant for Web Application Firewalls (WAFs). "Application Security Manager--our WAF--has always been one of F5's most popular products. Scores of customers have relied on it to protect...