DDos Attacks in South Africa Affect Every Aspect of Life

Hackers have made South Africa a target for massive DDos attacks, and there doesn’t seem to be an area of life that hasn’t been affected. In what appears to be an all-out “war,” the cyberattacks have hit banks, ISPs, governments, and even power grids. The onslaught has been so severe that all IT Departments are on alert for potential threats. DDos is defined as: “A distributed denial-of-service (DDoS) attack is
browser warning

Local website hacked for phishing expedition

A webserver hosted on the Telkom network, has been breached and used to host a phishing site.  Urlscan lists the site as naphotography.co.za with three levels of file systems as shown below. Cyber criminals do this to hide phishing sites. Naphotography.co.za / 83de / journal / citi Urlscan.io has confirmed that the domain had been comprised and used for phishing. Harvesting information from victims is used by cyber criminals to
What You Need to Know about Digital Piracy

What You Need to Know about Digital Piracy

The speed in which we have transitioned to the digital forms of communication has been compared to the magnitude of change that occurred in the industrial revolution. At no other time have we experienced such an alteration in the methods that we use, and in the race for global digitalization, companies and governments haven’t been able to keep up with the cybercriminals devoted to stealing proprietary property. The thieves involved

Internet Piracy in South Africa: The Conditions and Consequences

As the internet continues to become the main source for entertainment, countries around the globe are stepping up to incorporate laws for internet use and access. The problem is that the internet itself is the main culprit for the inability to catch criminals that are involved in cybercrime, and countries such as South Africa may have cybersecurity laws in place, but they are both weak and rarely acted upon. This
Gaming Industry at Great Risk for Cyber Attacks

Gaming Industry at Great Risk for Cyber Attacks

Cybercriminals have been increasing their attention to the gaming industry as an easy way to get access to credit card information. In a process known as “credential stuffing” criminals target their attacks using pre-existing stolen identifications, giving them the ability to make lucrative profits. The gaming industry as a whole is aware of the cybersecurity problems and have added additional security protocols. The Akamai Technologies Cloud delivery network provider put