Beware of the man in the middle
The motive for the vast majority of cybercrime is either to steal money or data. These attacks are sometimes small, targeting individuals, or sometimes massive, targeting large enterprises and stealing thousands of users’ details. In the majority of cases, attacks try...
Android app SandroRAT targets Polish banking
Europe is currently under attack by spammers trying to get control of Android devices. In Germany the distribution method is via SMS (text) messages, as you can read in this recent McAfee Labs post, while in Poland there is an on-going e-mail spam campaign...
Vivotek offers weatherproof surveillance
South Africans are no strangers to harsh weather conditions, with rough winds, hail downpours and thunderstorms that stun. With the new next-generation 1080p full HD speed dome network camera SD8364E from Vivotek, worries about the survival of your surveillance...
IoT is already here
With 2014 being dubbed as the year of the Internet of Things (IoT), there are major concerns regarding the security and privacy issues that consumers face now, and potential problems they could have in the future, says Trevor Coetzee, regional director South Africa...
Fighting the new style of cybercrime
The nature of the cybercrime landscape is shifting. No longer are the main threats related to the theft of personal details and financial information – like capturing logon credentials, identity theft and stealing credit card data. Today’s most destructive breaches...
Malware hides in Android apps
A common piece of advice for Android users is to refrain from downloading applications from unknown sources. Although malware does show up at the Google Play store from time to time, it is much better controlled, than on other app stores, says Carey van Vlaanderen,...
Netshield unveils data centre in a box
Netshield has unveiled its Data Centre in a Box offering, a self-contained IP 54 rated mobile unit that enables a business to rapidly and immediately wheel in, plug in and go, an entire IT infrastructure that can be managed from a single IP address in minutes. The...
Panda Security offers new consumer solutions
Panda Security has announced the launch of its new line of consumer solutions for 2015, boasting Panda’s new XMT Smart Engineering engine. The range includes; Panda Global Protection 2015, Panda Internet Security 2015, Panda Antivirus Pro 2015 and Panda Mobile...
Fake DHL notifications spread malware
One of the most common methods for distributing PC malware is the use of e-mail spam messages that pose as tracking notifications from popular delivery companies such as DHL Express, FedEx or UPS. The reason for this popularity is the malware’s effectiveness. Most of...
Potential protection against Hacienda
A group of journalists has reported the existence of the "Hacienda" spy program. According to this report, five western intelligence agencies are using the Hacienda software to identify vulnerable servers across the world in order to control them and use them for...
Kaspersky launches free scanner app
In order to safeguard users against a number of Android vulnerabilities discovered in recent months, Kaspersky Lab has released a free mobile application for the platform. Kaspersky Fake ID Scanner scans smartphones and tablets for vulnerabilities that put users’...
The science behind DDoS extortion
"Pay up or we’ll take your Web site down." So goes the adage that usually accompanies ransom-based cyber-attacks, says Bryan Hamman, territory manager - sub-Saharan Africa at Arbor Networks. Top of the news agenda in recent weeks, well-known names such as Evernote and...