PUPs wreak havoc
In the last few years, the spectre of potentially unwanted programs (PUPs) has reared its head. Myriad complaints litter tech forums, asking about this hazard, and complaining that they’ve been hacked, or infected, yet the vast majority of these ‘infections’ can be...
Effective IT security key for business
IT security spend is too often seen as a grudge purchase by business management. But the fact is – effectively securing enterprise networks is a business imperative, says Networks Unlimited. Anton Jacobsz, MD of Arbor Networks distributor Networks Unlimited, points...
Android devices come under malware attack
ESET has recently discovered the first confirmed case of ransomware that encrypts files held by Android devices. A Trojan, named Simplelocker, scans the SD care for certain file types, encrypts them, and demands a ransom in order to decrypt the files. Types of files...
Phishing service for the public sector
Global information security firm MWR InfoSecurity has become the first provider of phishing assessment services to be listed on G-Cloud, the UK Government’s approved online marketplace for the public sector. phish’d, by MWR, is a fully managed phishing assessment...
Successful SIEM boosts security
Headlines about major security breaches litter the headlines on a daily basis. Even more concerning are the thousands of unreported thefts of company data that happen every hour. Jayson O'Reilly, director of sales and innovation at DRS says losses can be enormous, not...
Kaspersky scores in comparative testing
Kaspersky Lab has announced the results of a comparative test intended to measure the overall efficiency of its new Kaspersky Security for Virtualization | Light Agent software in comparison with Symantec Endpoint Security and Trend Micro Deep Security running on a...
Symantec release tackles data growth
Symantec has released Backup Exec 2014, a unified solution that protects organisations’ critical data by delivering powerful, flexible backup and recovery across hybrid physical and virtual environments. This latest release builds upon the features and functionalities...
Hacker-resistant CCTV from TeleEye
Companies and individuals are increasingly turning to Webcams to help secure their premises. However, these high-tech solutions typically use Internet protocol (IP), an open standard, to connect back to control rooms. Like all open standards, IP can easily be hacked -...
Cisco expands malware solutions
Addressing the needs of South African customers to combat zero-day attacks and advanced persistent threats (APTs), Cisco is broadening its Advanced Malware Protection and Data Centre security offering. This will help in protecting against threats across the full...
Kaspersky offers World Cup travelling tips
If you still haven’t decided on how you plan to pay your bills while you’re in Brazil (should you be going) – cash or credit card – it is time to do so. Kaspersky Lab warns that Brazil has some of the most creative and active criminal’s specialising in credit card...
Hearts of Hope uses Accysys for security
When its existing access control and security system was disabled after being struck by lightning, Hearts of Hope, a Section 21 not-for-profit organisation focused on the welfare of vulnerable children, looked to Accsys for help. A replacement system was needed to...
Security is no longer a catch-up game
Up until now, security has been mostly a catch-up game. A vulnerability is discovered, a patch is issued and applied, and so on and so forth. However, as with all catch-up games, it will inevitably fail. By the time a new threat has taken hold, or the vulnerability...