Skip to content
  • Home
  • Contact Us
  • Services
    • Cyber Security Services
      • Phishing Simulation Solutions
      • Malware and Virus Removal
      • Penetration Testing
      • Vulnerability Assessments
      • Managed Services
      • Test your Domain
    • Digital Forensics
    • Cyber Fraud Investigations
    • Keynote / Guest Speaker
    • Governance | Risk | Compliance
      • Assessing Your Company’s Risk Profile
      • Cyber Risk Profiling
      • Website Audits
      • Cyber Insurance
  • Training
    • Cyber Security Training
    • Courses
  • Articles
    • Blockchain & Bitcoin
    • Cyber Security
    • Cybercrime
    • Credit Card Fraud
    • Data Breaches
    • Forensics
    • Malware
    • Phishing
    • Ransomware
    • Social Engineering
    • Scams
  • Media
  • About Us
    • Da Vinci Team
    • Newsletter
    • PAIA Manual
    • Podcast
    • Resources | Free Templates & Logs
    • Terms & Conditions
    • Terms of Engagement
  • Partners
  • Home
  • Contact Us
  • Services
    • Cyber Security Services
      • Phishing Simulation Solutions
      • Malware and Virus Removal
      • Penetration Testing
      • Vulnerability Assessments
      • Managed Services
      • Test your Domain
    • Digital Forensics
    • Cyber Fraud Investigations
    • Keynote / Guest Speaker
    • Governance | Risk | Compliance
      • Assessing Your Company’s Risk Profile
      • Cyber Risk Profiling
      • Website Audits
      • Cyber Insurance
  • Training
    • Cyber Security Training
    • Courses
  • Articles
    • Blockchain & Bitcoin
    • Cyber Security
    • Cybercrime
    • Credit Card Fraud
    • Data Breaches
    • Forensics
    • Malware
    • Phishing
    • Ransomware
    • Social Engineering
    • Scams
  • Media
  • About Us
    • Da Vinci Team
    • Newsletter
    • PAIA Manual
    • Podcast
    • Resources | Free Templates & Logs
    • Terms & Conditions
    • Terms of Engagement
  • Partners

Tag: software

LOG4j: What is it? How will you be affected? What is Being Done?

LOG4j: What is it? How will you be affected? What is Being Done?

Log4j is an example of a company trying to do something as a fix that spiraled into a major problem. […]

Read more
The Sonar botnet panel.

All About Ransomware

In the last few years a rather nasty form of malware has been showing up in both private and business […]

Read more
ransomware

Ransomware Software Evolves

May 25, 2015 was the beginning of increased reports from companies all over the world, indicating a system compromise. As […]

Read more

South African Companies Paying a High Price for Ransomware

SA Cyber Security Specialists Look to New Strategies to Protect Companies

How You Can Avoid Falling Prey to Catfishing on Social Media

Top 5 industries that need to focus on cybersecurity training

Cyber Insurance

RSS CyberEd | Digital Piracy

  • Explaining Anti-Piracy to Kids and Preventing the Downloads
  • Digital Piracy Hurts Everyone and Raises Prices
  • Fighting the elusive World of Digital Piracy in South Africa
  • Gaming Industry at Great Risk for Cyber Attacks

Most Searched

Bitcoin Trading Chat Colonial Pipeline Communicate Compliant Conspiracy Cyberattack Dangers Dark Side Data protection Death Star East Coast Education Exchanges Fire Eye Forex Gas Government Grooming Impersonation Infrastructure IT Departments NotPetya virus Orion Panic Petrol Platform POPIA PPE Regulations Regulator Russians Scammers Schools Signal Social Media Social Media Chat Teenagers Telegram Threat Actors Tick Tock Trafficking United Kingdom US Young Girls

Contact us:

Da Vinci CyberSecurity & Digital Forensics
Johannesburg - Cape Town
Registration number: 2014/183742/07

Tel: + 27 63 693 1956

sitelocklogo

 

webreputationlogo

 

Find Us on Social Media

Follow Us

Memberships

Memberships-davinciforensics

Recent Articles

  • South African Companies Paying a High Price for Ransomware
  • The Hacking of Credit Bureau TransUnion South Africa: Millions of Records Stolen
  • Getting Help to Keep Ransomware From Destroying Your World
  • What Consumers and Businesses Can Do to Minimize the Affects of Cyber Hacking
© 2022 . Proudly powered by Da Vinci Cybersecurity
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
Powered by CookieYes Logo
]