Analyse behaviour for early breach detection

By understanding how users behave and tracking legitimate processes, organisations can enlist user and entity behaviour analytics (UEBA) to spot security breaches. A remote machine took over an employee account at a large national grocery chain by circumventing the...
Energy detected beyond Milky Way

Energy detected beyond Milky Way

Wits scientists are part of a multinational team of astronomers working on the High Energy Stereoscopic System (HESS) telescopes that have again demonstrated its excellent capabilities in searching for high-energy gamma rays. In the latest discovery, HESS found three extremely luminous gamma-ray sources in the Large Magellanic Cloud (LMC), a satellite dwarf galaxy of the Milky Way.

Phishing rages on in August

Analysing the evolution of spam in August, Kaspersky Lab has seen phishing activity increase almost 1,5 times, with 32-million detections. Yahoo! was attacked so often (6,4%) that it displaced Windows Live as one of the top three organisations attacked by phishers,...

The changing role of malware detection

Today malware detection as implemented by what some still refer to as the anti-virus industry has three main components, and although each component has been regarded as its “primary” function by different commentators at different times, all three still...

Detection, response is key for security

The real target for cybercriminals today is not technology. It’s the employee. With security measures being increasingly more effective, often the only point of entry to a company’s network for a cybercriminal is via an employee. In addition, the mobility of employees...