The Solar Winds Hack Shows the Danger to All Countries

The Solar Winds Hack Shows the Danger to All Countries

The hacking that occurred in many of the U.S. agencies and departments has caused a massive tsunami around the globe.  The breach may have made the news in its announcement of the plight in the U.S., but it has also caused major problems with organizations, companies (including Microsoft), and even other governments of the world. […]

South Africa Suffers with Third Highest Cybercrime

South Africa Suffers with Third Highest Cybercrime

As if 2020 wasn’t bad enough with a global pandemic that has brought most of the world to its knees, South Africans have experienced an insult to industry by having the third number of cyber crime victims. A report by Accenture shows that even though South Africa ranks 25th in the world’s population, its citizens […]

7 of the Safest Browsers to Use

7 of the Safest Browsers to Use

We have become a global population that depends on our internet browsers for almost everything. However, not all browsers are alike as each one offers a variety of differences in both security and privacy. As with everything in technology, companies ebb and flow based on popularity, ease of use, and business trends. 7} Microsoft Edge […]

Cyber Hacking in the Game World

Cyber Hacking in the Game World

Gaming represents billions of dollars of profit around the globe and this hasn’t gone unnoticed by cybercriminals. Depending upon how a platform operates, gaming can bring everything from a list of users to the software design for game knockoffs that can be sold in the black market on illicit websites. In July, 2020, the DOJ […]

Credential-stuffing

Credential Stuffing Phishing

In a few surveys, it was estimated that nearing 81% of users reuse the same login and 25% use the same password across multiple accounts. Given that there are many cybercriminals that are successfully breaching various systems, all they have to have is stolen credentials that consist of usernames, emails and the corresponding passwords. Credential […]