What to do as Ransomware Continues to Attack South Africa
The largest problem regarding ransomware in South Africa is that a majority of organisations have taken little or no steps to be proactive against these attacks.
What Happens After a Session Hijacking Attack
The fact that almost any network or computer session is vulnerable to session hijacking should give pause to everyone. While these forms of cyberattacks typically happen to web applications and browser session, they do also rely on knowing the cookie session of the victim which is also called cookie side-jacking or cookie hijacking. Many often […]
Session Hijacking: Another Form of Cyber Attack
Almost all systems are vulnerable to session hijacking and they can be a serious threat to web applications and networks. Session hijacking, also known as “token hijacking” allows the attackers to have access to a network without the requirement of authentication. Once in, the cybercriminals know that they won’t need to have to be concerned […]
Small Business Cybersecurity Toolkit
Cybersecurity Toolkit for Small Business means that everyone in the company must be educated in the event of a breach or cyber attack.
Protecting Against Gmail Virus Attack
Google and their email service, Gmail, have become the gold standard services for both individual and some company accounts. As a global corporation, Google has maintain levels of excellence that have not been surpassed by many and the additional features such as Google Map has made them the most popular in most of South Africa. […]