Longline phishing rears its ugly head
The past few years have seen a tremendous rise in the use of email as an attack vector for enterprises and larger entities. These attacks have also evolved in sophistication, from the first examples of malicious links or attachments being included in emails, to the...
New biometric solutions from OneVault
OneVault announced the launch of their hosted Proof-of-Life voice biometric solution which assists companies to confirm identity and life via a remote channel. ‘Proof-of-Life’ or ‘Certificate of Existence’ is a requirement of many organisations, specifically the likes...
Kaspersky Lab adds patents to IP portfolio
To effectively combat malicious software, Kaspersky Lab experts are constantly developing new tools that use advanced technology. Some of them are highly specialised, others are used in all products. One of the most interesting developments – the system and method for...
Security key as Africa moves to LTE
Securing the network is a top priority for telcos and carriers as LTE becomes increasingly mainstream across Africa, says Fortinet. Perry Hutton, regional director of Fortinet for Africa, says: “LTE is changing the playing field. The previous generation of mobile...
Integrated security a must
Businesses are under constant pressure to prevent security breaches by cunning and sophisticated adversaries that are targeting their most sensitive data. These attacks can have devastating consequences for organisations - putting their staff and customers at...
Botnets: robots to avoid
Malware has been around in some form for over 40 years, but the use of malware to take control of a group of computers that are then organised into something called a botnet is more than a 21st century phenomenon, says Carey van Vlaanderen, CEO of ESET Southern...
Fighting the outsider threat
It is common sense that the sooner an attack is identified, the faster it can be contained and mitigated, limiting the fallout as much as possible. Businesses need to supplement their traditional security tools and protocols with skilled incident response teams,...
Protection in the IoT age
We all have so many devices and so many technology toys, and we are loving the ability to link our lives to the cloud, says Mark McCallum, Orange Business Services, head of Global Services Africa. We’re learning more about ourselves too, as wearable devices become...
Kaspsersky delivers 4Pb of security updates
Kaspersky Lab delivers 60,000 updates a month to all of its protection products worldwide. The total size of these updates is equivalent to four petabytes. That is roughly the same as 1 million movies, or more than 10 million books. If you stacked all those tomes in a...
Mobile data encryption and performance
It seems as though there is a new security breach related to data traveling over the Internet almost every day, says Martin Walshaw, senior engineer at F5 Networks. Every day might be an exaggeration of reality, but if it happens to be your data that is stolen or...
Sophos grows network security portfolio
Sophos has announced additions to its range of SG Series firewall/UTM appliances, WiFi access points as well as a new dedicated virtual reporting appliance, Sophos iView. By extending its Network Security portfolio with new entry-level and enterprise class appliances,...
Antivirus is not dead
Symantec vice-predisent Brian Dye recently claimed that antivirus software is dead, causing ripples in the infosec world, and a barrage of statements both in defence of this idea, and in denial. Lutz Blaeser, MD of Intact Software Distribution, says AV is far from...