All ARTICLES

ALL ARTICLES

yyy yyyy

What recent data breaches tell us about cybersecurity in South Africa

The past couple of months should lay to rest any doubt over whether South African organisations are under sustained attack from cybercriminals. Over the past three months we’ve seen well-known local healthcare and financial organisations falling v ...

yyy yyyy

How conversational commerce is shaping the future of business

While `conversational commerce` is not a new concept, the phenomenon is gaining momentum, driving innovation and customer experience in an ever-changing e-commerce landscape.

yyy yyyy

Private browsing: How it doesn’t shield you from prying eyes on the web

Many people look for more privacy when they browse the web by using their browsers in privacy-protecting modes, called “Private Browsing” in Mozilla Firefox, Opera and Apple Safari; “Incognito” in Google Chrome; and “InPrivate” in Microso ...

yyy yyyy

Facebook accused of watching Instagram users through cameras

Facebook is again being sued for allegedly spying on Instagram users, this time through the unauthorised use of their mobile phone cameras. The lawsuit springs from media reports in July that the photo-sharing app appeared to be accessing iPhone cam ...

yyy yyyy

30 years of ransomware: How one bizarre attack laid the foundations for the malware taking over the world

Ransomware has been one of the most prolific cyber threats facing the world throughout 2019, and it`s unlikely to stop being a menace any time soon.

yyy yyyy

Ransomware: How clicking on one email left a whole business in big trouble

Security experts have given an insight into how a targeted ransomware attack took down the network of a food and drink manufacturer after hackers took advantage of common security vulnerabilities. The crooks used a phishing attack and took advantag ...

yyy yyyy

Honeypot reveals tactics used by cybercriminals to deploy ransomware

A honeypot created by Cybereason to lure cybercriminals and analyze their methods showed that ransomware attacks infiltrate their victims in multiple stages.

yyy yyyy

Honeypot reveals tactics used by cybercriminals to deploy ransomware

A honeypot created by Cybereason to lure cybercriminals and analyze their methods showed that ransomware attacks infiltrate their victims in multiple stages.

yyy yyyy

Cybersecurity: Four ways you can keep the hackers away

From senior buy-in to layered security and onto cross-business education, here`s how CIOs can create an information security strategy that helps to keep hackers out and data safe.

yyy yyyy

Ransomware: Huge rise in attacks this year as cyber criminals hunt bigger pay days

Researchers warn of a seven-fold rise in ransomware attacks compared with last year alone - and attackers are continually evolving their tactics.

yyy yyyy

EOH faces R44m fine for delays in home affairs tender

The Department of Home Affairs (DHA) has moved to salvage the controversial multimillion-rand Automated Biometric Identification System (ABIS) tender and slapped technology services company EOH with a R44 million penalty over delays in the implementa ...

yyy yyyy

security of your surfing activities.

software that bolts-on to your browser to enhance the privacy and HTTPS Everywhere: Available for Firefox, Chrome, and Opera, HTTPS Everywhere is a plugin created by the Tor Project and Electronic Frontier Foundation (EFF) to expand HTTPS encryp ...

yyy yyyy

How Takealot crushed Makro

Takealot is South Africa’s largest online shopping platform, with over 2,000 employees and sales of around R1 billion per month. Takealot is owned by Naspers and operates the country’s top ecommerce platforms â€` Takealot.com, Superbalist.com, a ...

yyy yyyy

Homeland Security subpoenas Twitter for data breach finder`s account

Homeland Security has served Twitter with a subpoena, demanding the account information of a data breach finder, credited with finding several large caches of exposed and leaking data.

yyy yyyy

Channelling customer expectations through WhatsApp

Markets are noisy and busy. Companies are clamouring for customer attention and their share of wallet and engagement. It has become increasingly important for organisations to make connections with their customers, to create personal environmen ...