Public Wi-Fi hotspots have popped up all over our cities, from restaurants and malls, to local parks. They are convenient and relatively easy to access, and tend to evoke that data saving scrooge inside us all. The City of Cape Town has even jumped on board and are beginning to provide public Wi-Fi hotspots for more and more suburbs with aim of having at least one hotspot per ward.
With so many of us connecting to these hotspots and the ever increasing threat from cybercriminals it is important to understand and be aware of the dangers of using public Wi-Fi.
February 14th is fast approaching bringing with it mixed emotions as always. If you’re the romantic type and have someone to celebrate with I’m sure you have prepped for Sundays events and are anxiously anticipating the festivities. If you’re single you are most likely anxiously dreading the day everyone else’s happiness is rubbed in your face. Whatever side of the fence you’re on there is definitely reason for anxiety.
Valentine’s Day scams will be back in full force from bargains and cards to WhatsApp emoticons. Here is our list of things to look for to keep yourself free from cyberattacks.
Drones can be used to record incredible scenes for movies, follow thieves from above, save lives or carry out home deliveries at lightning speed. Unfortunately, this also opens doors for people to misuse them for malicious gain.
Researchers in Singapore have demonstrated how attackers using a drone with a mobile phone could easily intercept documents sent to a seemingly inaccessible Wi-Fi printer. The method they devised is actually intended to help organisations determine if they have vulnerable open Wi-Fi devices that can be accessed from the sky. But the same technique could also be used by spies for corporate espionage.
To demonstrate that this threat is real and exists, the investigators paired a drone with a smartphone and developed two apps that were designed to intercept the communications of a printer from the outside.
In the corporate environment, cyber-threats are becoming more and more sophisticated, security standards more complex and budgets tighter and tighter.
The world of technology in the workplace is no longer just restricted to servers, workstations or email accounts – instead we need to consider mobile devices and the culture of BYOD (Bring Your Own Device). Companies also need to be aware of problems that may arise from new trends such as social media and the impact that all of this can have on the security of our corporate networks.
This places great stress on businesses when it comes to the monitoring and management of information security.