SAPS partners CSIR to combat cybercrime

post image

The South African Police Service (SAPS) has partnered the Council for Scientific and Industrial Research (CSIR) to tackle cybercrime in the country, a move police commissioner Riah Phiyega says is a “critical milestone”. “The sustained pace of globalization and significant advances in Information Communication Technology (ICT) after 1994 have increased the risk factors for South [...]

Biggest ADSL bandwidth hogs in SA

post image

The latest ISP statistics show that South Africa’s top ADSL users consume the same as hundreds of low-end consumers. The biggest uncapped ADSL bandwidth users in South Africa are consuming between 2TB and 3TB per month. This is according to the latest statistics from some of the country’s top ISPs. The average bandwidth usage by [...]

Report: Pistorius iPhone code remains elusive

post image

Gaining access to murder-accused Oscar Pistorius’ iPhone for crucial evidence is turning into a technical nightmare for investigators – and time is running out. Gaining access to murder-accused Oscar Pistorius’ iPhone for crucial evidence is turning into a technical nightmare for investigators – and time is running out. This is according to reports from City [...]

Report: Ethiopian Government Hacks Journalists in U.S. and Europe

post image

The Ethiopian government reportedly used surveillance technology created by an Italian company to hack into the computers of Ethiopian journalists in the United States and Europe. Journalists at the Ethiopian Satellite Television (ESAT), a news organization comprised mostly of Ethiopian expatriates, were targeted with spying software made by the Italian company company Hacking Team, according [...]

Sanral exposes user details

post image

A new security flaw in the South African National Roads Agency’s (Sanral’s) e-toll Web site exposes registered users’ personal details, leaving them vulnerable to criminal activity. Exploiting the flaw, attackers could – until this morning – gain access to unsuspecting victims’ accounts, including their personal data such as car registration, phone numbers, physical address and [...]

Biggest security threats in 2014

post image

Sophos released its latest Security Threat Report on 10 December 2013, predicting a greater focus from cybercriminals on high quality and convincing phishing and social engineering. Download: Threat Report 2014 The report outlines the significant changes in cyber-criminal behavior over the course of last year and a forecast for their preferred methods of attack in [...]

Trends to Watch in 2014

post image

Major technology developments over the last year—and a series of revelations about the National Security Agency that shook the international security community—made 2013 an interesting year for trend watchers. In highlighting the past year’s security events, we’ve considered some emerging trends we are likely to see in the coming year. 1. Attacks on corporate and [...]

Cybersecurity Will Get More Complex in 2014

post image

Bad news for all businesses, big and small. Cybersecurity is going to get a lot more complicated in 2014. Global nonprofit IT association ISACA believes IT and cybersecurity professionals should resolve now to gear up for accelerated change and complexity in 2014, especially in cybersecurity, data privacy and big data. [...]

1 2 3