CCTV monitoring in poor bandwidth conditions
The South African farming community faces a number of unique challenges. The very nature of farms, which can comprise of hundreds or even thousands of hectares of geographically dispersed land, makes monitoring them a difficult task, even when the farm owner or...
ESET launches Cyber Security for Mac
ESET Southern Africa has announced the release of brand new and improved ESET Cyber Security Pro and ESET Cyber Security. Both products come with added layers of protection to Apple’s built in Internet security features. Key new functionalities include: new...
Kaspersky patents network scanning tech
Kaspersky Lab has successfully patented technology that enhances the effectiveness of network traffic scanning for the presence of cyber-threats. Patent 8650646 issued by the United States Patent and Trademark Office (USPTO) describes a method for minimising the...
The corporate toilet: a hacking hotspot
There is a long list of consumer devices that can be hacked and the information used to access corporate or personal data. Since the Black Hat security conference in September 2013, the toilet has now been added to that list, and if something as innocuous and...
Trend Micro grows mobile security solutions
Trend Micro has boosted protection against cyber-attacks via mobile platforms by unveiling a new set of security solutions. The new solutions will help mitigate threats to mobile networks and devices, including product enhancements to support enterprises and...
Biometric protection the future of security
Biometric identification systems have grown in popularity as more company use fingerprint, face, iris or voice recognition as part of their risk management strategies, says Marius Coetzee, MD at Ideco Biometrics.A market that was once dominated by fingerprint...
GIT deploys CCTV solution for EACB Studio
When EACB Studio director Casper Badenhorst discovered funds were missing from his office at his business premises in Sandown Square, Johannesburg, he had to act quickly to identify the culprit and prevent further loss. To secure evidence, high quality footage of the...
Stop spam, save money
When the Web was in its infancy, spam was a minor annoyance, and not much more. However, as with all other aspects of the Web, spam has evolved into something far more dangerous that is costing business enormously, in terms of bandwidth, productivity and down time....
NSA surveillance hype must not be ignored
Last year, when Edward Snowden dropped the revelation that the United States National Security Agency was peering into the private data of individuals and companies, the world sat up and took notice. All the hype that security companies had been generating over the...
Turla and Agent.btz worms possibly related
Experts from G-Data and BAE Systems recently released information about a persistent cyber-espionage operation codenamed Turla (also referred to as Snake or Uroburos). Further to this, Kaspersky Lab's research and analysis team have now found an unexpected connection...
Cyberoam grows managed security automation
Cyberoam, the leading global provider of network security appliances has announced deeper integration between Cyberoam Central Console (CCC) and ConnectWise, the developer of the leading service management software designed exclusively for IT service providers, VARs,...
Fortinet expands DDoS product family
Fortinet − a world leader in high-performance network security – has expanded its distributed denial of service (DDoS) product family with four new appliances for data centre managers and system architects at mid- to large-sized enterprises and managed service...