Misinformation Reducing Security in Countries

Misinformation Reducing Security in Countries

It should first be stated that misinformation and published propaganda isn’t new. In the past those that wanted to spread what is now called “fake news” made use of the methods of the time: publications and radio. Laws in some countries made it difficult to extend false stories in the news media, but this completely changed with the advent of the internet and social media popularity. This form of propaganda
Job Post

False jobs Sites

There are a large number of South Africans looking for working and any advert is an opportunity for an unemployed person to submit their details and hope for the best. A popular job site on Facebook received a post advertising employment, using a short link (abbreviated url) to send job seekers to a page where there was an advert for Checkers looking for staff. The Facebook page states that “We
browser warning

Local website hacked for phishing expedition

A webserver hosted on the Telkom network, has been breached and used to host a phishing site.  Urlscan lists the site as naphotography.co.za with three levels of file systems as shown below. Cyber criminals do this to hide phishing sites. Naphotography.co.za / 83de / journal / citi Urlscan.io has confirmed that the domain had been comprised and used for phishing. Harvesting information from victims is used by cyber criminals to
Malvertising - davinciforensics

Malvertising: Accessing Your Data through Legitimate Advertising

Both consumers and businesses have long made the assumption that malware is delivered in a variety of ways, but most are through accessing low-level websites or opening email. As with any form of cyber hacking, the criminals have developed even more sophisticated methods and the most recent has been sending malware through legitimate advertising areas.  This process has opened the portal to unknowing consumers that are downloading everything from ransomware
5 Major Short List Topics to Help Deter Your Security Risk

5 Major Short List Topics to Help Deter Your Security Risk

Chief Information Security Officers have made some radical changes over the last year or so, including the understanding that security breaches involve a number of variables. From internal and external sources to the very technology that we use to do business, CISO’s are taking action to address these and other issues to deflect the risk of security problems.  The entire topic may seem overwhelming to some, but every company is