Your Computer Might Be A Zombie

Your Computer Might Be A Zombie

Yes, you read the headline correctly... Zombies are real and the dastardly horde might be breeding in YOUR PC. In computer terms, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse and can be used to perform malicious tasks of one sort or another under remote direction on other unsuspecting victims. Botnets of zombie computers are often used

Brazil’s Cybercrime And SA

Brazil’s Cybercrime: A Red Flag Alert for SA Each week, it seems that there is a new cyber security threat from a growing list of countries. One of the latest alerts has come from Brazil, and the underground market is not just launching cyberattacks, but has turned the concept into a business by selling the tools and training. While most of the devious cyber criminals prefer to stay low-key, it

Cyber Hackers Target SA

In January, 2015, the international online auction site, eBay, encouraged users to change their passwords as their system had been hacked and while the area that houses the 145 million user password information was encrypted, the warning was set as a precaution only. As we see mega-giants in the online information world take ‘hits’ from the cybercrime world, it is a red flag alert to both businesses and private citizens

Copier and Printer Identity Theft

One of the few technologies that we have thought of as innocent and unassuming, has turned out to be a major identity thief gold mine. The printers, fax machines and copiers that we use in our home and office have hard drives with memory, and they can store sensitive and personal information that can be easily accessed. Since 2002, almost all copies that have been manufactured for business use and

Cyber Attacks On Health Systems

Healthcare is one of the few verticals that contains almost every piece of personal information for the average consumer patient. With the various laws and stipulations on health system data security, it has led most people to feel confident that their data will be safe from cyber criminals. But in the world of cyber hacking, the servers that contain this information are just too tempting and this has led to