" cybercrime "

young man with glasses sitting in front of his computer, programming. the code he is working on (CSS) can be seen through the screen.

Cybercrime Surges in Q3

PandaLabs Q3 Report indicates that incidences of cybercrime continue to increase, with 18 million new malware samples captured this quarter – more than 200,000 samples daily.
(more…)

Group of young creative people having a meeting in the office. Women are working on laptop while two men are talking to each other. The view is through the glass.

1/5 Businesses Infected by Malware through Social Media

We have all started to move to digital, and it’s making our lives simpler and easier. Or is it?

(more…)

wifi blog

How safe are Public Wi-Fi Networks

Public Wi-Fi hotspots have popped up all over our cities, from restaurants and malls, to local parks. They are convenient and relatively easy to access, and tend to evoke that data saving scrooge inside us all. The City of Cape Town has even jumped on board and are beginning to provide public Wi-Fi hotspots for more and more suburbs with aim of having at least one hotspot per ward.

With so many of us connecting to these hotspots and the ever increasing threat from cybercriminals it is important to understand and be aware of the dangers of using public Wi-Fi.
(more…)

Untitled-1

How to avoid of Valentine’s Day scams

February 14th is fast approaching bringing with it mixed emotions as always. If you’re the romantic type and have someone to celebrate with I’m sure you have prepped for Sundays events and are anxiously anticipating the festivities. If you’re single you are most likely anxiously dreading the day everyone else’s happiness is rubbed in your face. Whatever side of the fence you’re on there is definitely reason for anxiety.

Valentine’s Day scams will be back in full force from bargains and cards to WhatsApp emoticons. Here is our list of things to look for to keep yourself free from cyberattacks.

(more…)

Drones

How a drone can hack into your home network just by flying over it

Drones can be used to record incredible scenes for movies, follow thieves from above, save lives or carry out home deliveries at lightning speed. Unfortunately, this also opens doors for people to misuse them for malicious gain.

Researchers in Singapore have demonstrated how attackers using a drone with a mobile phone could easily intercept documents sent to a seemingly inaccessible Wi-Fi printer. The method they devised is actually intended to help organisations determine if they have vulnerable open Wi-Fi devices that can be accessed from the sky. But the same technique could also be used by  spies for corporate espionage.

To demonstrate that this threat is real and exists, the investigators paired a drone with a smartphone and developed two apps that were designed to intercept the communications of a printer from the outside.

(more…)

cybersecurity3

The Advantages of Having a Managed Security Service

In the corporate environment, cyber-threats are becoming more and more sophisticated, security standards more complex and budgets tighter and tighter.

The world of technology in the workplace is no longer just restricted to servers, workstations or email accounts – instead we need to consider mobile devices and the culture of BYOD (Bring Your Own Device). Companies also need to be aware of problems that may arise from new trends such as social media and the impact that all of this can have on the security of our corporate networks.

This places great stress on businesses when it comes to the monitoring and management of information security.

(more…)