browser warning

Local website hacked for phishing expedition

A webserver hosted on the Telkom network, has been breached and used to host a phishing site.  Urlscan lists the site as with three levels of file systems as shown below. Cyber criminals do this to hide phishing sites. / 83de / journal / citi has confirmed that the domain had been comprised and used for phishing. Harvesting information from victims is used by cyber criminals to
What You Need to Know about Digital Piracy

What You Need to Know about Digital Piracy

The speed in which we have transitioned to the digital forms of communication has been compared to the magnitude of change that occurred in the industrial revolution. At no other time have we experienced such an alteration in the methods that we use, and in the race for global digitalization, companies and governments haven’t been able to keep up with the cybercriminals devoted to stealing proprietary property. The thieves involved

Internet Piracy in South Africa: The Conditions and Consequences

As the internet continues to become the main source for entertainment, countries around the globe are stepping up to incorporate laws for internet use and access. The problem is that the internet itself is the main culprit for the inability to catch criminals that are involved in cybercrime, and countries such as South Africa may have cybersecurity laws in place, but they are both weak and rarely acted upon. This
Gaming Industry at Great Risk for Cyber Attacks

Gaming Industry at Great Risk for Cyber Attacks

Cybercriminals have been increasing their attention to the gaming industry as an easy way to get access to credit card information. In a process known as “credential stuffing” criminals target their attacks using pre-existing stolen identifications, giving them the ability to make lucrative profits. The gaming industry as a whole is aware of the cybersecurity problems and have added additional security protocols. The Akamai Technologies Cloud delivery network provider put
Internet of Things IoT Security

Should we be Worried about Internet of Things (IoT) Security?

As more of our devices become internet-enabled, it seems that IoT is forging ahead to appease our demand for ease of use. However, there are some problems with this process. As we access all of these wondrous tools that are connected to our network, very few people are asking the critical question: are they secure? The stream of IoT products that are hitting the market bring incredible advantages in technology