POPI Act Finally Has the Power | Data Protection SA

POPI Act Finally Has the Power

The POPI (Protection of Personal Information Act 4 of 2013) in South Africa became effective in 2016, however, as most businesses know, it has had little in the way of enforcement. This status has completely changed effective July 1, 2020, because now POPIA is empowered with the ability to investigate and fine responsible parties for […]

Easiest Way for Cybercrime is with “Privileged Access” in an Organization

Easiest Way for Cybercrime is with “Privileged Access”

One of the priorities of every cybersecurity organisation is to explain that a majority of breaches in a system occurs due to compromised “privileged access” accounts. Depending on the age and size of a business, privileged access account management could have gone unchecked for years to decades, allowing an increasing number of accounts to access […]

Cybercriminals Use Facebook Profile Impersonation for Scams

Cybercriminals Use Facebook Profile Impersonation for Scams

Facebook has had a litany of problems almost since its inception. Creating a business model that has online advertising opened the door for some rather devious criminals. The unfortunate fact that Facebook users seemed to trust the social media platform enough to not only put large volumes of personal information but to also attach payment […]

Cyber Hacking in the Game World

Cyber Hacking in the Game World

Gaming represents billions of dollars of profit around the globe and this hasn’t gone unnoticed by cybercriminals. Depending upon how a platform operates, gaming can bring everything from a list of users to the software design for game knockoffs that can be sold in the black market on illicit websites. In July, 2020, the DOJ […]

Explaining Tabnabbing Phishing

Explaining Tabnabbing Phishing

Tabnabbing has been one of the tried and true forms of phishing since around 2010. The attacker takes advantage of the fact that many people are busy and don’t pay attention to the tabs that they open in their browser. The cyber criminal’s ability to imitate credible website views allows them to appear like a […]