Stop paying ransoms to hackers says the FBI
WASHINGTON, June 23 (Reuters) – On Wednesday, FBI Director Chris Wray urged public corporations and other hacking victims to avoid
Computer crime, or cybercrime, is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
WASHINGTON, June 23 (Reuters) – On Wednesday, FBI Director Chris Wray urged public corporations and other hacking victims to avoid
What is the purpose of the Act? • The purpose of the Promotion of Access to Information Act, 2000 (often
Act No. 19 of 2020: Cybercrimes Act, 2020 The Cybercrimes Act 19 of 2020 intends: to create offences which have
POPIA is empowered with the ability to investigate and fine responsible parties for lack of compliance in data protection.
A huge Chinese espionage effort against US and European government agencies, according to security firm FireEye, comprises four new hacking
Cyber criminals using ransomware have been around for a long time however in the last 5 years or so they
As if a global pandemic hasn’t been enough, it appears that cybercrime is on the rise in South Africa as
Experian reported that no consumer financial or credit data was included in the batch supplied in the South African breach.
The priority of every cybersecurity organisation is to explain that a majority of breaches in a system occurs due to compromised “privileged access” accounts.
Facebook has had a litany of problems almost since its inception. Creating a business model that has online advertising opened
The problem with extremist apps, websites, and social media is that those that join them are typically also those that
Online learning at 15 Schools in the United Kingdom halted due to cyberattack. The Nova Education Trust co-operative own all
Incident_Response_Plan_Template Source: Techtarget
Incident_Response_Template-1 Source: Thycotic
Bitcoin is one of the newer cryptocurrency methods for trading, and as with everything on the internet, scammers and cybercriminals
The hacking that occurred in many of the U.S. agencies and departments has caused a massive tsunami around the globe.
As if 2020 wasn’t bad enough with a global pandemic that has brought most of the world to its knees,
A population that depends on internet browsers for everything. Not all browsers are alike as each one offers differences in both security and privacy.
Gaming represents billions of dollars of profit around the globe and this hasn’t gone unnoticed by cybercriminals. Depending upon how
A successful credential stuffing attempt is a cybercriminal who takes over an individual’s account and expands to other potential accounts.
Tabnabbing has been one of the tried and true forms of phishing since around 2010. The attacker takes advantage of the fact that many people are busy and don’t pay attention to the tabs that they open in their browser.
The fact that almost any network or computer session is vulnerable to session hijacking should give pause to everyone. While
Knowledge is power, assess to protect!! Our Vulnerability Assessment service empowers organisations to fortify their digital defences. We meticulously scan
A bespoke cyber insurance policy will help to offset the high costs of providing incident response services and associated costs relating to a cyber breach
Almost all systems are vulnerable to session hijacking and they can be a serious threat to web applications and networks.
Cybersecurity Toolkit for Small Business means that everyone in the company must be educated in the event of a breach or cyber attack.
Cybersecurity is one of the top considerations and should be considered part of the cost of doing business. Small companies
The COVID-19 pandemic has hit just about every country and cybercriminals have taken full advantage of its crippling effects. The
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |