Session Hijacking: Another Form of Cyber Attack

Session Hijacking: Another Form of Cyber Attack

Almost all systems are vulnerable to session hijacking and they can be a serious threat to web applications and networks. Session hijacking, also known as “token hijacking” allows the attackers to have access to a network without the requirement of authentication. Once in, the cybercriminals know that they won’t need to have to be concerned […]

Should we be Worried about Internet of Things (IoT) Security?

Internet of Things IoT Security

As more of our devices become internet-enabled, it seems that IoT is forging ahead to appease our demand for ease of use. However, there are some problems with this process. As we access all of these wondrous tools that are connected to our network, very few people are asking the critical question: are they secure? […]

Trapping and Convicting a South African Pirate TV Box Seller

Television piracy has increased over the last number of years to the point where many consumers are so accustomed to it that they are unaware of the fact that it is not only theft, but one that is being cracked down on with severe consequences. The cost of entertainment and media piracy is in the […]

System Penetration Testing: Why It’s Important and How it Can Keep You Secure

Penetration testing

As cyberattacks around the globe have increased and cybercriminals add new and innovative methods to breach networks, businesses are now incorporating penetration testing as a way to catch the loopholes before the criminals do. Circumventing these criminals is an ongoing process, as each time you plug one hole, they develop the next generation of Trojans […]

Ways to Improve Your Small Business Security

small business - cybersecurity - davinci

This is the fourth segment of a four part series devoted to helping small businesses understand cybersecurity and some of the steps that they can take to protect themselves. Small businesses are more susceptible to cybercrime simply due to the nature of the beast. Owners are embedded in the operations and success of the business […]

]