Gugi Banking Trojan outsmarts new Android 6 Security
By Press Release 7 September 2016Kaspersky Lab experts have discovered a modification of the Gugi banking trojan that can bypass new Android 6 security features designed to block phishing and ransomware attacks. FULL STORY >
Sony launches two-stage verification process for PlayStation Network accounts
By Robin-Leigh Chetty 25 August 2016Having suffered telling security breaches in recent years, Sony finally adds a much needed two-stage verification process to PSN and PSP accounts. FULL STORY >
The end of a free Windows 10: what this means for cybersecurity
By Press Release 24 August 2016The end of free is real. FULL STORY >
Sophos announces beta release of Sophos Intercept – next-generation endpoint technology to boost protection against unknown ex
By Press Release 4 August 2016Sophos Intercept integrates next-generation endpoint defence technologies into a single product, including the progressive anti-exploit technology acquired with... FULL STORY >
BlackBerry unveils DTEK50 as world's most secure Android smartphone
By Staff Writer 27 July 2016The company's second Android-powered device, the DTEK50 from BlackBerry is reportedly the most secure Android smartphone in the world. FULL STORY >
New solution to beat identity theft from Ideco
By Press Release 21 July 2016The Future of Who I am, according to Ideco. FULL STORY >
Breaking down the walls of isolation to beat cybercrime
By Press Release 20 July 2016Cyber criminology for financial gain continues to be an escalating global trend but education, being prepared and proactive will go a long way to beating the cyber criminals, notes Graham Croock, director, IT Audit, Risk at Cyber Lab BDO. FULL STORY >
Cyber Security is a Battle of the People versus Email Scammers
By Press Release 28 June 2016The ‘Nigerian Prince’ or ‘419’ email scams we’ve all seen take advantage of the age-old premise: people can be greedy and gullible. Or to put it more positively – people are intrinsically positive about the motives of... FULL STORY >
The need for modernised South African cybersecurity laws
By Press Release 22 June 2016Despite four pieces of legislation and one policy to combat cybercriminals, BDO's Graham Croock and Phukubje Pierce Masithela Attorneys' Lucien Pierce believe SA is still lacking in terms of cybersecurity law. FULL STORY >
Security Alert: Starting an online business?
By Press Release 21 June 2016Daryl Blundell, managing director, Sage SSB (Start-up and small business) provides five security tips that will help keep your business’s online store safe. FULL STORY >
Three quarters of organisations at significant risk of cyber incidents
By Ryan Noik 21 June 2016A new survey focusing on cybersecurity, released by RSA, the Security Division of EMC, has revealed a number of interesting and alarming findings with regards to the security landscape and how it impacts on businesses. FULL STORY >
New voice recognition technologies to bring call centres woes to an end
By Ryan Noik 17 June 2016The end of frustrating telephone verification processes are in sight, as new voice recognition technologies have matured sufficiently to be used widely by call centres in confirming the identity of customers on the phone. FULL STORY >
Why every business should pay more attention to printer security
By Ryan Noik 17 June 2016Printer security is an often overlooked vulnerability that can, and is, exploited by hackers. Ravi Perumal, Country Category Manager Print Business Group HP Inc. explains the importance of considering printer security when ... FULL STORY >
Why Preventing Rooting and Jailbreaking is so important
By Press Release 10 June 2016Director of BlackBerry Security, Alex Manea, explains why the idea of rooting and jailbreaking is one of the most controversial topics when it comes to mobile devices. FULL STORY >
BlackBerry enhances single secure platform for multi-OS device, application and content management
By Press Release 9 June 2016BlackBerry says its fully integrated solution for MDM, MAM and MCM will provide businesses with unprecedented control of complete mobile assets from a single unified administrative experience. FULL STORY >
Most Read Articles

Have Your Say
What new tech or developments are you most anticipating this year?


