IT Security

tracking apps

Are mobile apps watching and tracking South Africans?

The monitoring capabilities of mobile apps are becoming a concern for South African users, many of whom are worried that the apps on their connected devices might be able to track them down, watch what they’re doing, or share their data. But these dangers could be easily averted by putting some simple security measures in place, warns cybersecurity experts from Kaspersky Lab. There are rising conc... »


Cryptocurrency social engineering schemes helped criminals net nearly $10 Million last year

Kaspersky Lab experts have exposed a relatively new fraudulent trend: the development of cryptocurrency is not only attracting investors, but also cyber-criminals seeking to boost their profits. During the first half of 2018, Kaspersky Lab products blocked more than a hundred thousand triggers related to cryptocurrencies on fake exchanges and other sources. With each attempt, criminals have been t... »

Small businesses in South Africa critical to 4th Industrial Revolution

NukeBot designed to steal credentials of online banking customers

Kaspersky Lab researchers have detected NukeBot – new malware which has been designed to steal the credentials of online banking customers. Earlier versions of the Trojan were known to the security industry as TinyNuke, but lacked the features necessary to launch attacks. The latest versions however, are fully operable, and contain code to target the users of specific banks. Although the appearanc... »

whatsapp scam

New WhatsApp scam on the rise

According to a report via the, a new WhatsApp scam is on the rise. As revealed by the report, scammers are now posing as the relative or friend of an individual. Preying on the relationship between friends or family, after a brief conversation, the scammers say they are in a difficult situation. They then proceed to ask the victim to send them money via various ewallet servi... »

Security Tips

Protect Yourself From Hackers With These Top Security Tips

Did you know that 56% of all data breaches in 2016 began with a user clicking on a phishing email, giving hackers access to a corporate network? Everyone has something of value to a cybercriminal. Don’t take the bait – always stop and think before you act. Here are some cyber-safe tips to think about: 1. In public How the hackers do it Man-in-Middle attack: Using a special software, a hacker inser... »

Petya attack

Petya attack points to alarming trend in cybercrime

Another major cyberattack named Petya has been wreaking havoc across the world, highlighting the need for greater focus on cybersecurity education. The cyberattack originated in the Ukraine going on to cause major disruption across the globe. It has hit major infrastructure in the areas where it has spread, with security experts speculating that it might be functioning in a similar manner to the i... »


Ransomware: An Evolving Threat for Developed Markets

Mobile ransomware actors are focusing their attacks on wealthy countries. Developed markets not only have a higher level of income, but also a more advanced and more widely used mobile and e-payment infrastructure. According to Kaspersky Lab’s annual ransomware report for 2016-2017, this is appealing to criminals because it means they can transfer their ransom in just a couple of taps or clicks. K... »

Dvmap Trojan

Android users be warned of the Dvmap Trojan

Kaspersky Lab experts have discovered an unusual new Trojan being distributed through the Google Play Store. The Dvmap Trojan is capable not only of obtaining root access rights on an Android smartphone, it can also take control of the device by injecting malicious code into the system library. If successful, it can then delete root access, which helps to avoid detection. The Trojan, which has bee... »


Hackers deliberately targeting data that causes emotional distress

Hackers are increasingly relying on patients’ emotional distress at having their intimate and sensitive details shared to manipulate them into giving in to their demands, says Martin Walshaw, senior engineer at F5 networks. The recent cyberattack on a Lithuanian cosmetic surgery clinic is evidence of a new trend in cybercrime – one in which hackers threaten to expose their victims’ most intimate a... »

Citrix Synergy 2017

Citrix Synergy 2017: Stan Black discusses the Citrix stance on security

Stan Black, CISSP, is the chief security officer at Citrix where he is in charge of the secure delivery of applications and data to some of the world’s largest organisations in healthcare, financial services, public sector, manufacturing and more. Black defines a converged cyber security posture including vulnerability management, incident response and physical security to reduce the attack surfac... »

Page 1 of 6123»