The murky waters of Android banking malware
Banking malware continued to plague the Android platform throughout 2018, with cybercrooks relentlessly targeting users with banking trojans and fake banking apps, but also experimenting with new money-stealing techniques. To help users navigate the tricky and...
Why cybersecurity is vital to business strategies in 2019
Relentless cyber criminals are becoming smarter and more resourceful by the day. 2018 taught us many lessons and one of them is that companies cannot afford to develop business strategies without cybersecurity being at the heart of it. By Clayton Naidoo, GM for Cisco...
Why you should use a pseudonym at Starbucks
Innocently providing your name at your local coffee shop is just an example of how easy it can be for miscreants to cut through the 'privacy' of social media accounts, says Carey van Vlaanderen, CEO at ESET South Africa. When Starbucks introduced personalising the...
Communication missing in physical and IT security integration
Better communication is the key to integrating physical and IT security in enterprises today. This is according to Charl Ueckermann, CEO at AVeS Cyber Security, who says physical and IT security resources have traditionally been treated as separate disciplines. As...
Kaspersky Lab automates training platform
In 2017, 59% of South African companies attributed weaknesses in their IT security strategy to the careless actions of employees. With staff training seen as an important way to reduce cybersecurity incidents, finding the most efficient approach remains a pain point...
Naspers warns of e-book scam
The Naspers Group has been made aware of a scam targeting members of the South African public. Victims of the scam receive an e-book via social media channels such as WhatsApp and Telegram, which describes Naspers as "a registered online trading platform". As part of...
Security predictions for 2019
NetScout Arbor, which specialises in advanced distributed denial of service (DDoS) protection solutions, has released its security predictions for this year, against a background which saw the largest ever DDoS attacks being unleashed in 2018. Bryan Hamman, territory...
Is your business getting its priorities right?
If 77% of cyberattacks happen through apps, why do companies spend 90% of their security budget securing the perimeter of their systems? F5 Networks revealed this statistic back in 2016, and yet businesses don't seem to have changed their spending priorities. By...
A cybersecurity checklist for African SMEs
Email is still an organisation's weakest point, with 91% of attacks starting with email-based phishing attacks. And they're not going away. In fact, 90% of global organisations have seen an increase in the volume of phishing attacks in the last year. By Heino Gevers,...
Carbon Black receives five-star customer ratings
Carbon Black customers have given a thumbs-up to the company in a recent Gartner Peer Insights review. Carbon Black, a leader in next-generation endpoint security delivered by the cloud, received 112 five-star ratings from customers in the January 2019 Gartner Peer...
Safer Internet Day: better together
Yesterday was Safer Internet Day - a call for collaboration that comes at a time when corporate privacy scandals, global ransomware epidemics, nation-state attacks and the regrettably fast-expanding cybercriminal world all threaten to tear the internet apart....
A continuous approach to privileged access management
When we think of insider threats, the image that comes to mind is often that of a disgruntled employees looking to cause damage to an organisation. However, these threats are caused by honest mistakes more often than not, says Byron Davel, product manager at Credence...