Gemalto pioneers SIM Reactivation solution
Gemalto has announced LinqUs SIM Reactivation, the world's first solution for real-time reactivation of dormant SIMs that allows operators to seamlessly reconnect lost prepaid subscribers at a fraction of normal acquisition costs. Gemalto's innovative platform is...
Ideco drives global biometric authentication
Having recently launched what it believes to be a world-first biometric solution that aims to change the way governments manage citizen authentication, Ideco now plans to revolutionise the $2-trillion global payment processing industry. With projected annual revenues...
Keep shopping malls and shoppers safe
With the annual holiday season fast approaching and shopping malls nationwide preparing for the usual end of year deluge, the safety and security of both tenants and consumers plays a critical part in the effective management of South Africa's retail environment....
Combating financial payment fraud using EFT
It is strange to think that one of the most used methods of transacting online - through a credit card - is actually not designed for the purpose. Security features such as the hologram, PIN and magnetic strip have all evolved over the course of 30 years to make...
Fujitsu Announces Availability of PalmSecure BioLock for SAP
Fujitsu has announced immediate availability of PalmSecure BioLock, the industry's most secure access control technology for SAP systems. Providing biometric access control for SAP ERP and HANA systems, Fujitsu PalmSecure BioLock is now available for the first time....
Social media can increase robbery risk
The 2016 Norton Cybersecurity Insights Report revealed that 67% of South Africans feel that it is getting more difficult to control their personal information due to smartphones and the internet. The popularity of social media platforms are growing rapidly in South...
Businesses need smarter technology strategies
Increased digitisation by companies in order to cut costs and streamline operations can have the opposite effect if cyber risks are not managed. This is according to Charl Ueckermann, managing director of AVeS Cyber Security. As part of its medium-term budget released...
Move over attackers, these are the big leagues
When a gaming provider is taken offline it frustrates hardcore users and damages the company's reputation. Because availability is of such primary importance to gamers, these firms are frequent targets for attack. "With distributed denial of service (DDoS) attacks...
Arbor Networks debuts virtualised internal network traffic analysis
Arbor Networks, the security division of NETSCONetScoutUT, has introduced version 2.2 of Arbor Networks Spectrum, to the African region. Arbor Spectrum v2.2 is a high performance network traffic analysis platform integrating Netflow, packet and threat intelligence...
Protecting your personal credentials
It starts with innovative password selections, says Martin Walshaw, senior engineer at F5 Networks. Data is the lifeblood of our business lives and is of paramount importance to corporations everywhere. Yet, we have recently seen another set of personal information...
IQ Retail guards against new-age threats
Stories of cyber-attacks hit the news almost daily - data breaches, DDos attacks, email hacks and phishing attacks - reminders of the dangers of the internet. Yet somehow all of these attacks still seem foreign- as though it would never happen to us. The reality is,...
Understanding the modern webcam threat
On 21 June, Mark Zuckerberg, Facebook's CEO, posted a message on the social network celebrating an Instagram landmark. The photo and video-sharing platform, which is owned by Zuckerberg's company, is now enjoyed by more than 500-million active monthly users. This...