South Africa Suffers with Third Highest Cybercrime

South Africa Suffers with Third Highest Cybercrime

As if 2020 wasn’t bad enough with a global pandemic that has brought most of the world to its knees, South Africans have experienced an insult to industry by having the third number of cyber crime victims. A report by Accenture shows that even though South Africa ranks 25th in the world’s population, its citizens […]

Cyber Hacking in the Game World

Cyber Hacking in the Game World

Gaming represents billions of dollars of profit around the globe and this hasn’t gone unnoticed by cybercriminals. Depending upon how a platform operates, gaming can bring everything from a list of users to the software design for game knockoffs that can be sold in the black market on illicit websites. In July, 2020, the DOJ […]

Credential-stuffing

Credential Stuffing Phishing

In a few surveys, it was estimated that nearing 81% of users reuse the same login and 25% use the same password across multiple accounts. Given that there are many cybercriminals that are successfully breaching various systems, all they have to have is stolen credentials that consist of usernames, emails and the corresponding passwords. Credential […]

What Happens After a Session Hijacking Attack

What Happens After a Session Hijacking Attack

The fact that almost any network or computer session is vulnerable to session hijacking should give pause to everyone. While these forms of cyberattacks typically happen to web applications and browser session, they do also rely on knowing the cookie session of the victim which is also called cookie side-jacking or cookie hijacking. Many often […]

Session Hijacking: Another Form of Cyber Attack

Session Hijacking: Another Form of Cyber Attack

Almost all systems are vulnerable to session hijacking and they can be a serious threat to web applications and networks. Session hijacking, also known as “token hijacking” allows the attackers to have access to a network without the requirement of authentication. Once in, the cybercriminals know that they won’t need to have to be concerned […]