0 comments

Simple steps to cyber security

By Press Release 20 November 2015

Cyber security is an ongoing war that takes place on many different battlefields, with threats primarily coming from three main sources: nation states, hacktivists, and organised crime FULL STORY >

0 comments

Fortinet elevates high-performance cybersecurity to the access layer

By Press Release 22 October 2015

Fortinet has announced details of its new Secure Access Architecture. This new framework expands Fortinet’s innovative Internal Segmentation cybersecurity strategy, enabling organizations to seamlessly segment devices and... FULL STORY >

0 comments

Threat of cyberattacks on the rise for entertainment & media industry

By Staff Writer 8 October 2015

Worldwide, entertainment and media companies are increasingly becoming targets for cybercrime as cyber criminals find new and innovative ways to defeat security measures and controls FULL STORY >

0 comments

Kaspersky Lab asks internet users: ‘are you cyber savvy?’

By Staff Writer 29 September 2015

User safety in the digital environment depends on a number of factors. First of all, it depends on the user’s ability to make the right decisions. FULL STORY >

0 comments

Let’s achieve balance about the Cybercrimes and Cybersecurity Bill

By Staff Writer 22 September 2015

The draft Cybercrimes and Cybersecurity Bill currently out for public comment is timeous in that it proposes legislation that will bring South Africa in line with international laws governing internet-based crimes FULL STORY >

0 comments

We need to up our game in the fight against cybercrime, and quickly

By Staff Writer 21 September 2015

Governments will have to invest in the fight against cybercrime if we are to mitigate the increasing risks brought on by the Internet of Things (IoT) FULL STORY >

0 comments

Regulation forces businesses to prepare for cyber attacks

By Staff Writer 18 September 2015

Cybercrime and the risks thereof are increasingly making headlines, with hackers’ constantly conceptualising of new and innovative ways to gain unauthorised access to private commercial networks FULL STORY >

0 comments

Ashley Madison represents new darker stage of cyber hacking

By Staff Writer 9 September 2015

In late July, Avid Life Media (ALM) – owners of online dating site Ashley Madison – confirmed it had been the victim of a massive data breach, potentially exposing the personal details and identities of millions of Ashley Madison... FULL STORY >

0 comments

BPHSs: A professional cybercriminal’s perfect hideout

By Staff Writer 31 August 2015

A new research paper from the threat research team at Trend Micro has taken a closer look at a part of the cybercriminal underground that you have probably never crossed your mind - Bulletproof Hosting Services (BPHSs). FULL STORY >

0 comments

Data kidnapping: The new way for cybercriminals to get your money

By Staff Writer 21 August 2015

In April Trend Micro released a research paper about sextortion - the means through which cybercriminals obtain compromising personal images or videos of Internet users - which they then hold hostage until their demands have been... FULL STORY >

0 comments

Kaspersky Lab: "Darkhotel" cyberespionage group boosts attacks with exploit leaked from hacking team

By Staff Writer 12 August 2015

Following the public leak of files belonging to Hacking Team – the company known for selling “legal spyware” to some governments and law enforcement agencies – a number of cyberespionage... FULL STORY >

0 comments

Kaspersky Lab Report: Mobile malware has grown almost 3-fold in Q2 while cyber-espionage attacks target SMB companies

By Staff Writer 3 August 2015

Kaspersky Lab has published its Q2 cyber-threats report highlighting key security incidents of the quarter and evaluating the Q2 cyber-threat level. FULL STORY >

0 comments

Five ways SME’s can protect themselves from cybercrime this tax season

By Staff Writer 14 July 2015

In a recent uptick in tax identity fraud, criminals have been targeting the HR departments of various companies in order to file fraudulent tax returns, says Carey van Vlaanderen CEO of ESET Southern Africa. FULL STORY >

0 comments

PandaLabs release Q1 2015 Results – 225 000 new malware strains per day

By Staff Writer 6 July 2015

PandaLabs has released the results for the first quarter of 2015, which analyses IT security episodes and incidents from January through to March 2015. FULL STORY >

0 comments

A cybersecurity survival guide for small businesses

By Staff Writer 17 June 2015

Carey van Vlaanderen of ESET offers advice on what precautions small businesses should be taking to protect themselves and keep vital data from falling into the wrong hands FULL STORY >

(Page 50 of 56) 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | 54 | 55 |

Read
Magazine Online
TechSmart.co.za is South Africa's leading magazine for tech product reviews, tech news, videos, tech specs and gadgets.
Start reading now >
Download latest issue

Have Your Say


What new tech or developments are you most anticipating this year?
New smartphone announcements (45 votes)
Technological breakthroughs (29 votes)
Launch of new consoles, or notebooks (14 votes)
Innovative Artificial Intelligence solutions (29 votes)
Biotechnology or medical advancements (24 votes)
Better business applications (160 votes)