
Do apps need all the permissions?
By Press Release 4 October 2019Friends mention an exciting new app, or we see a promotion that requires an app to be downloaded, and the rush is on to download the app and start interacting with it. But do we consider the permissions needed by the app? FULL STORY >

Smart TVs - Yet another way for attackers to break into your home?
By Press Release 8 August 2019A primer on why internet-enabled TVs make for attractive and potentially soft targets, and how cybercriminals can ruin more than your TV viewing experience. FULL STORY >

Ransomeware 1010: Understanding cybersecurity's biggest threat
By Press Release 17 May 2019Ransomware is always evolving - attackers getting more sophisticated in how the infect systems, avoid detection and foil decryption efforts nobody is safe, says Carey van Vlaanderen, CEO at ESET South Africa. FULL STORY >

Look who’s Stalking
By Opinion 5 April 2019Aren’t we just making it too easy for online followers to become real-life trackers with the amount of open data we are posting online? FULL STORY >

10 Ways to ruin a Cybercriminal's day
By Press Release 3 April 2017These days, everyone – from the most inexperienced to the most advanced user – takes measures to protect themselves from cybercriminals seeking to compromise or steal information, says Carey van Vlaanderen, CEO at ESET South Africa. FULL STORY >

2016: The Security Challenge
By Press Release 20 January 2016The greatest challenge of 2016 will be to focus on protecting networks, internet access and the way in which devices are interconnected, says Carey van Vlaanderen, CEO ESET Southern Africa. FULL STORY >

Business security: Is simpler better?
By Press Release 12 October 2015While some companies can be pretty strict about their cyber security policies, and risk that at the end of the day this might be counterproductive, others apply more flexible approach FULL STORY >

5 Systems Admin relationship tips (So you’re on talking terms again)
By Staff Writer 31 July 2015If you’ve spent much time interacting with system administrators, you know how unlikely it would be for them to host a relationship-fixing TV show. FULL STORY >

Five ways SME’s can protect themselves from cybercrime this tax season
By Staff Writer 14 July 2015In a recent uptick in tax identity fraud, criminals have been targeting the HR departments of various companies in order to file fraudulent tax returns, says Carey van Vlaanderen CEO of ESET Southern Africa. FULL STORY >

A cybersecurity survival guide for small businesses
By Staff Writer 17 June 2015Carey van Vlaanderen of ESET offers advice on what precautions small businesses should be taking to protect themselves and keep vital data from falling into the wrong hands FULL STORY >

What is a botnet and how does it spread?
By Staff Writer 9 April 2015Have you ever seen posts on social networks or emails under your name that you did not send? Is your computer running slowly or do you often find your screen filled with pop ups. FULL STORY >

Business beware -malware threat increasing
By Staff Writer 16 September 2014Businesses have been placed on alert that their security measures from a year ago may now be inadequate to deal with this year’s evolving malware attacks. FULL STORY >

ESET - Public Wi-Fi poses potential security threat
By Staff Writer 12 November 2012South Africans are being warned to exercise caution when accessing free public Wi-Fi, as increasing numbers of local users risk having sensitive personal information captured. FULL STORY >
Most Read Articles


Have Your Say
What new tech or developments are you most anticipating this year?
