News

Google launches Keen – An AI-powered rival to Pinterest

Google launches Keen – An AI-powered rival to Pinterest

Technology
MY BROADBAND Google has launched a new content curating social media platform called Keen, which allows users to collect and discover...
Read More
SA’s Cyber Crimes Bill edges forward amid increased attacks

SA’s Cyber Crimes Bill edges forward amid increased attacks

Security
IT WEB With more South Africans now working from home, it has amplified the need for the country’s Cyber Crimes...
Read More
5 Crucial Cybersecurity Principles for Businesses

5 Crucial Cybersecurity Principles for Businesses

Security
IT NEWS AFRICA The face of cybercrime has changed, alongside the strategies used. It’s no longer just the teen hacker...
Read More
There are 577 Malware Attacks in South Africa Every Hour, Research Shows

There are 577 Malware Attacks in South Africa Every Hour, Research Shows

Security
IT NEWS AFRICA The 2019 KnowBe4 African Report found that the continent is increasingly vulnerable to cyber-attacks. The report highlighted...
Read More
A technology perspective on the possible health risks of 5G

A technology perspective on the possible health risks of 5G

Technology
IT-ONLINE The recent deployment of 5G mobile networks has created much debate on the possible health risks due to higher...
Read More
Work from home video conferencing demands increased cybersecurity

Work from home video conferencing demands increased cybersecurity

Technology
Cyber security concerns have increased as employees move to work from home, with video conferencing becoming a key new area...
Read More
How the weak rand has hit tech prices in South Africa

How the weak rand has hit tech prices in South Africa

Technology
MY BROADBAND The rand’s weak performance in 2020 has heavily impacted the cost of importing tech from around the world...
Read More
How to clean your smartphone and tablet properly

How to clean your smartphone and tablet properly

Technology
MY BROADBAND Whether you’re working remotely, home-schooling, or just binge-watching an old favourite to pass the time, you’re putting in...
Read More
Residential demand for VoIP services increases during lockdown uncertainty

Residential demand for VoIP services increases during lockdown uncertainty

Technology
MY BROADBAND Lanline, a Voice over IP (VoIP) service provider in South Africa, is experiencing an unprecedented demand for its...
Read More
Beware of coronavirus scams

Beware of coronavirus scams

Security
MY BROADBAND Disturbingly, hackers are active even during times of global disaster, as evidenced in the various cyber-scams doing the...
Read More
The surprising number of South Africans who want to work from home after the lockdown is over

The surprising number of South Africans who want to work from home after the lockdown is over

Technology
MY BROADBAND 73% of tech-savvy South Africans want to continue working from home after the lockdown is over. This is...
Read More
Government establishes COVID-19 tracing database, quells spying fears

Government establishes COVID-19 tracing database, quells spying fears

Security
IT WEB While government will be setting up a national tracing database to determine the exposure of persons infected with...
Read More
Data governance 3.0: Running business according to data

Data governance 3.0: Running business according to data

Technology
IT WEB Data governance is no longer the sole responsibility of data stewards as businesses embrace a more collaborative approach, involving data...
Read More
Businesses adopt IoT despite security risks

Businesses adopt IoT despite security risks

Security
IT Online The use of Internet of Things (IoT) business platforms is growing year-on-year in almost all industries – in...
Read More
Technical recession, 4IR put pressure on jobs

Technical recession, 4IR put pressure on jobs

Technology
IT Online Having recently slipped into a technical recession, the South African economy continues to experience dangerously low levels of...
Read More
4G infrastructure critical to Africa’s 5G success

4G infrastructure critical to Africa’s 5G success

Technology
IT Web The easiest path to 5G in Africa is through an infrastructure upgrade on 4G, says a senior industry...
Read More
Sophos introduces Intercept X for Mobile

Sophos introduces Intercept X for Mobile

Technology
IT WEB Sophos (LSE: SOPH), a global leader in next-generation cyber security, today introduced Sophos Intercept X for Mobile with new security capabilities...
Read More
GDPR heralds new age of robust data management

GDPR heralds new age of robust data management

Security
IT -WEB The age of businesses collecting, using and storing personal data any way they choose is over and the...
Read More
Data breach exposes need to secure cloud servers

Data breach exposes need to secure cloud servers

Security
IT-Online A data breach at a recruitment company exposed by GlobalData’s Verdict has underlined the need for companies to check...
Read More
The ‘password reset’ email phishing scam is still extremely effective

The ‘password reset’ email phishing scam is still extremely effective

Security
Memeburn People are still falling for password reset phishing schemes online, this according to a report by KnowBe4. Phishing is...
Read More
The PC is back and 2020 will be its year

The PC is back and 2020 will be its year

Technology
IT Web / Image credit: denizbayram | Getty Images It turns out the PC's death has been exaggerated. PC sales...
Read More
How your network can be hacked from a lightbulb

How your network can be hacked from a lightbulb

Security
IT Online Internet of Things (IoT) devices as simple as light bulbs could be used to help intruders hack into...
Read More
The IOT-entrepreneurship link

The IOT-entrepreneurship link

Technology
IT Web - Image credit: Dong Wenjie | Getty Images South Africa has the makings of a very strong entrepreneurial...
Read More
Dissecting the network to uncover points of vulnerability

Dissecting the network to uncover points of vulnerability

Security
IT Web Once a business knows where the weakest links are in its network, it will have a better idea of...
Read More
The huge Windows piracy problem in South Africa

The huge Windows piracy problem in South Africa

Security
My BroadBand Only a third of PCs being shipped to Africa include genuine software, which is a reason for the...
Read More
The Internet is no longer a disruptive technology

The Internet is no longer a disruptive technology

Technology
Tech Central Internet-enabled industry disruption defined business strategy in the 2010s, but as 2020 begins, that era appears to be winding...
Read More
Why moving to the cloud doesn’t need to be costly for small business

Why moving to the cloud doesn’t need to be costly for small business

Technology
IT News Africa Migration to the cloud is becoming common practice for businesses across the globe, moving from a nice-to-have...
Read More
DNS amplification attacks rise 4 800% year-on-year

DNS amplification attacks rise 4 800% year-on-year

Security
IT Web DNS amplification attacks are soaring in number, growing 4 788% from Q3 2018 to Q3 2019. This was...
Read More
2020: What lies ahead for ICT policy and regulation?

2020: What lies ahead for ICT policy and regulation?

Technology
IT Web As policymakers, regulators, service providers and their customers return to work, what lies beyond the flurry of end-of-year...
Read More
The new norm: Trend Micro security predictions for 2020

The new norm: Trend Micro security predictions for 2020

Security
IT-Online he threat experts at global security leader Trend Micro all agree as the cloud and popularity of DevOps environments...
Read More
Deepfakes emerge as new threat to enterprise security

Deepfakes emerge as new threat to enterprise security

Security
IT Web The year 2020 will see a new level of cyber-attacks – fake audio-visuals are forecast to be increasingly used...
Read More
How cyber-crooks are succeeding with phishing

How cyber-crooks are succeeding with phishing

Security
IT-Online Simulated phishing tests with an urgent message to check a password immediately were the most effective when it comes...
Read More
Time to add a cyber incident response plan

Time to add a cyber incident response plan

Security
IT-Online This time of the year is a boom time for cybercriminals. Consumers are shopping and transacting more. Shopping websites...
Read More
IoT under fire from cybercriminals

IoT under fire from cybercriminals

Security
IT-Online Kaspersky honeypots – networks of virtual copies of various internet connected devices and applications – have detected 105-million attacks...
Read More
Virtual reality becomes real in the corporate arena

Virtual reality becomes real in the corporate arena

Technology
IT WEB You’ve applied for a job but when you arrive for your interview, instead of sitting down to impress...
Read More
How data management is changing

How data management is changing

Technology
As data and workloads transition to the cloud, data management best practices become increasingly important in guiding how businesses manage the data and...
Read More
Facial recognition learns to recognise emotions

Facial recognition learns to recognise emotions

Technology
IT-Online New AI facial expression recognition technology detects subtle changes in facial expression with a high degree of accuracy, giving...
Read More
SEACOM cutting off ISPs – “Nothing other than corporate greed”

SEACOM cutting off ISPs – “Nothing other than corporate greed”

Technology
MyBroadBand SEACOM’s decision to change its peering policy in South Africa from free and open peering to selective peering is “nothing...
Read More
Security expert warns of unprecedented phishing attacks in SA

Security expert warns of unprecedented phishing attacks in SA

Security
IT Web South Africa is witnessing an unprecedented increase in both simple opportunistic cyber attacks and complex targeted attacks, which are increasingly...
Read More
Spot the Phish

Spot the Phish

Security
Sophos 89% of phishing attacks are carried out by organized crime. Phishing emails lead to data harvesting or malicious code...
Read More
Safeguard your business against cyber threats

Safeguard your business against cyber threats

Security Uncategorized
IT Web In this digitally dominated world, nearly all businesses have an online presence. While embracing the digital playing field...
Read More
Cyber criminals aim to score with Rugby World Cup

Cyber criminals aim to score with Rugby World Cup

Security
IT Web With the Rugby World Cup underway, a security expert has warned that cyber criminals are match fit to breach the security...
Read More
South African websites hit by new Lilocked ransomware

South African websites hit by new Lilocked ransomware

Security
MyBroadBand A new form of ransomware called Lilocked (or Lilu) has been targeting Linux servers and encrypting website files, asking...
Read More
Half of Android smartphones open to attack by SMS

Half of Android smartphones open to attack by SMS

Security
IT Web Researchers at Check Point have discovered that certain Android-based phones, including models by Samsung, Huawei, LG and Sony, are...
Read More
Alarming Stats: Global cyber losses to reach $6 trillion in two years

Alarming Stats: Global cyber losses to reach $6 trillion in two years

Security
IOL The cyber threat is producing some alarming statistics. A report by Aon found that annual global cyber losses are...
Read More
10 ways to protect your business from cyberattacks

10 ways to protect your business from cyberattacks

Security
MyBroadBand One of the biggest threats businesses face in 2019 is cybercrime. There are many malicious parties online who are...
Read More
Government’s telecoms plan is a mess – Telkom CEO

Government’s telecoms plan is a mess – Telkom CEO

Telecommunications
MyBroadBand Telkom CEO Sipho Maseko has criticised the National Treasury’s recent discussion paper on economic transformation. Maseko has written a...
Read More
Half of cybersecurity incidents are man-made

Half of cybersecurity incidents are man-made

Security
IT-Online Despite automation, the human factor can still put industrial processes at risk: employee errors or unintentional actions were behind...
Read More
A significant number of operators have already deployed 5G

A significant number of operators have already deployed 5G

Telecommunications
Tech Central About 7% of telecommunications operators worldwide have already deployed 5G wireless network infrastructure, with the pace of roll-out expected...
Read More
Smart cities top Gartner’s hype cycle for Africa

Smart cities top Gartner’s hype cycle for Africa

Technology
ITWeb Smart city frameworks, the Internet of things (IOT) and low earth orbit satellite systems are the three technologies that will transform business in...
Read More
Trends that are transforming the ICT channel

Trends that are transforming the ICT channel

Technology
The distribution game is changing significantly. Twenty years ago, it was about box dropping, but the ongoing digitisation of practically...
Read More
Ransomware modifications double in a year

Ransomware modifications double in a year

Security
ITWeb Researchers from Kaspersky have discovered 16 017 new ransomware modifications in Q2 2019, some of which belong to eight...
Read More
Dangerous security flaws in Windows 10 – Update now

Dangerous security flaws in Windows 10 – Update now

Security
Jamie McKane - MyBroadBand A number of security vulnerabilities have been discovered in Windows 10. The security flaws are similar...
Read More
Spammers exploiting legitimate company websites

Spammers exploiting legitimate company websites

Security
IT-Online Malicious Internet users are increasingly exploiting registration, subscription and feedback forms on websites to insert spam content or phishing...
Read More
Microsoft launches Azure Security Lab

Microsoft launches Azure Security Lab

Security
Bradley Prior - MyBroadband Microsoft launched its Azure Security Lab at the Black Hat 2019 conference, VentureBeat reports. Azure Security Lab is...
Read More
How VR could drive interest in space travel

How VR could drive interest in space travel

Technology
Bloomberg – MyBroadband On May 25, 1961, U.S. President John F. Kennedy said Americans would land a man on the...
Read More
The legalities of the digital signature

The legalities of the digital signature

Security
By Rian Schoeman, Etion Secure (Incorporating Lawtrust) - MyBroadBand Digitalisation and digital transformation have seen a significant organisational shift from...
Read More