
Cyber Forensic: Entering the Dark Side of Information Technology
When you watch some of the crime fighting programs on television, you
Expert articles on cybercrime, OSINT, digital forensics and cybersecurity for South African businesses and investigators online.

When you watch some of the crime fighting programs on television, you

This is the fourth segment of a four part series devoted to

This is the third segment of a four part series devoted to

This is the second segment of a four part series devoted to

This is the first segment of a four part series devoted to

The number of DDoS (denial-of-service) attacks are increasing around the globe. While

Cybercriminals have made quite a profession on DDoS (denial-of-service) attacks and in

Identity theft in SA has become one of the largest major concerns,

Identity theft in SA has become one of the largest major concerns,
One in four law firms with at least 100 attorneys have experienced

There is a very high percentage of websites that have vulnerabilities that

Our cyber analyst team works with you to identify your key cyber

Who is the weakest link in an organisation? The staff member… Almost

Digital forensics (sometimes known as digital forensic science) is a branch of

Computer forensics is the application of investigation and analysis techniques to gather

Mobile device forensics is a branch of digital forensics relating to recovery

Network forensics is a sub-branch of digital forensics relating to the monitoring

Cloud Forensics & Security Cloud forensics is the application of digital forensics

“Memory forensics is forensic analysis of a computer’s memory dump. Its primary
South Africans are feeling the effects of an increase in cybercrime, collectively

Airline companies around the globe have been making attempts at alerting their
There may be assumptions that individuals and businesses that fall prey to

The global labour market has experienced some dynamic shifts and changes in

In November, 2013, the President enacted PoPI and since that time there

Known as the “USB Thief”, it was discovered by ESET security firm

Due to the lack of attention and security efforts, South Africa is

Choosing the best possible protection is vital to guard against current Internet

Yes, you read the headline correctly… Zombies are real and the dastardly

Point of Sale (POS) manufacturers may make every attempt for secured data

Google and their email service, Gmail, have become the gold standard services

One of the more popular methods of accessing consumer account information is
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |