Trend Micro hosts third Capture the Flag competition
Trend Micro will host Trend Micro CTF 2017 - Raimund Genes Cup, the third annual Capture the Flag (CTF) cybersecurity competition. Trend Micro CTF targets young professionals in the cybersecurity industry to enhance their practical skills in areas such as cybercrimes,...
Must-have Android privacy and security apps
NordVPN presents 10 must-have apps for your Android device to keep your data safe and private This year has seen some of the biggest hacks in history. For example, Yahoo, who admitted one of the largest breaches last year, announced about another hack in February,...
Personal information – take care before you share
Identity theft and fraud is a widespread global phenomenon that has gained considerable momentum in South Africa in the last decade. The internet and social media - combined with the naivety of the public in sharing personal information - have helped make the work of...
Kaspersky Lab extends Bug Bounty Program
Kaspersky Lab has announced the extension of its Bug Bounty Program, which encourages qualified individuals and organisations to submit reports on vulnerabilities and bugs found in its products. Initially launched in August 2016, in partnership with leading bug bounty...
Toshiba broadens security portfolio
Toshiba South Africa has announced Toshiba Mobile Zero Client (TMZC), the first mobile zero client solution based on standard laptops that enables companies to perform all IT-based tasks with all data stored away from a set device, offering IT teams unrivalled levels...
Securing the blockchain
Currently, digital cryptocurrencies are on the up and up, with at least 100 active, suitably valuated cryptocurrencies being used as acceptable tender. The benefit of bitcoin, and other virtual digital cryptocurrencies, lies in their anonymity, and with...
WannaCry a wake-up call for organisations
If ever there was a time to be vigilant online and on networks, it is now. A new strain of the WannaCry ransomware, which recently affected major corporate networks and high profile organisations across the world, is unprecedented in its scale and severity. Data...
South African SMBs ripe for ransomware attacks
While the immediate threat of cyber-carnage in the wake of the WannaCry attack has been averted, South African SMBs are in the firing line of the next global malware outbreak. That's the view of Craig Jones, chief technology officer of technology and digital...
Protect your organisation from ransomware
Brendan Mc Aravey, country manager at Citrix South Africa, offers advice on how to avoid becoming a victim. Recent news of possibly the largest ransomware attack in history -- WannaCry -- has permeated the globe. WannaCry is an operating system exploit, one of many...
The future in biometrics
Viwe Ndzamela. marketing manager: banking and payments at Gemalto, examines how biometrics can help companies and their customers to have a safer, more convenient experience. What do consumers want when they bank or shop? Often, they want just two things: for their...
How to survive a global cyber attack
The most effective defense against the "Wanna Cry" global cyber attack is to update operating systems, install software updates and be on high alert for suspicious emails. "Awareness campaigns are crucial and companies must invest in these to make sure their employees...
Data-centric security enhancements from CA
CA Technologies has launched new data protection enhancements to CA Data Content Discovery and CA Compliance Event Manager that simplify security management across the enterprise and enable robust, end-to-end protection for data-in-motion from mobile to mainframe. The...