News

GDPR heralds new age of robust data management

GDPR heralds new age of robust data management

Security
IT -WEB The age of businesses collecting, using and storing personal data any way they choose is over and the...
Read More
Data breach exposes need to secure cloud servers

Data breach exposes need to secure cloud servers

Security
IT-Online A data breach at a recruitment company exposed by GlobalData’s Verdict has underlined the need for companies to check...
Read More
The ‘password reset’ email phishing scam is still extremely effective

The ‘password reset’ email phishing scam is still extremely effective

Security
Memeburn People are still falling for password reset phishing schemes online, this according to a report by KnowBe4. Phishing is...
Read More
The PC is back and 2020 will be its year

The PC is back and 2020 will be its year

Technology
IT Web / Image credit: denizbayram | Getty Images It turns out the PC's death has been exaggerated. PC sales...
Read More
How your network can be hacked from a lightbulb

How your network can be hacked from a lightbulb

Security
IT Online Internet of Things (IoT) devices as simple as light bulbs could be used to help intruders hack into...
Read More
The IOT-entrepreneurship link

The IOT-entrepreneurship link

Technology
IT Web - Image credit: Dong Wenjie | Getty Images South Africa has the makings of a very strong entrepreneurial...
Read More
Dissecting the network to uncover points of vulnerability

Dissecting the network to uncover points of vulnerability

Security
IT Web Once a business knows where the weakest links are in its network, it will have a better idea of...
Read More
The huge Windows piracy problem in South Africa

The huge Windows piracy problem in South Africa

Security
My BroadBand Only a third of PCs being shipped to Africa include genuine software, which is a reason for the...
Read More
The Internet is no longer a disruptive technology

The Internet is no longer a disruptive technology

Technology
Tech Central Internet-enabled industry disruption defined business strategy in the 2010s, but as 2020 begins, that era appears to be winding...
Read More
Why moving to the cloud doesn’t need to be costly for small business

Why moving to the cloud doesn’t need to be costly for small business

Technology
IT News Africa Migration to the cloud is becoming common practice for businesses across the globe, moving from a nice-to-have...
Read More
DNS amplification attacks rise 4 800% year-on-year

DNS amplification attacks rise 4 800% year-on-year

Security
IT Web DNS amplification attacks are soaring in number, growing 4 788% from Q3 2018 to Q3 2019. This was...
Read More
2020: What lies ahead for ICT policy and regulation?

2020: What lies ahead for ICT policy and regulation?

Technology
IT Web As policymakers, regulators, service providers and their customers return to work, what lies beyond the flurry of end-of-year...
Read More
The new norm: Trend Micro security predictions for 2020

The new norm: Trend Micro security predictions for 2020

Security
IT-Online he threat experts at global security leader Trend Micro all agree as the cloud and popularity of DevOps environments...
Read More
Deepfakes emerge as new threat to enterprise security

Deepfakes emerge as new threat to enterprise security

Security
IT Web The year 2020 will see a new level of cyber-attacks – fake audio-visuals are forecast to be increasingly used...
Read More
How cyber-crooks are succeeding with phishing

How cyber-crooks are succeeding with phishing

Security
IT-Online Simulated phishing tests with an urgent message to check a password immediately were the most effective when it comes...
Read More
Time to add a cyber incident response plan

Time to add a cyber incident response plan

Security
IT-Online This time of the year is a boom time for cybercriminals. Consumers are shopping and transacting more. Shopping websites...
Read More
IoT under fire from cybercriminals

IoT under fire from cybercriminals

Security
IT-Online Kaspersky honeypots – networks of virtual copies of various internet connected devices and applications – have detected 105-million attacks...
Read More
Virtual reality becomes real in the corporate arena

Virtual reality becomes real in the corporate arena

Technology
IT WEB You’ve applied for a job but when you arrive for your interview, instead of sitting down to impress...
Read More
How data management is changing

How data management is changing

Technology
As data and workloads transition to the cloud, data management best practices become increasingly important in guiding how businesses manage the data and...
Read More
Facial recognition learns to recognise emotions

Facial recognition learns to recognise emotions

Technology
IT-Online New AI facial expression recognition technology detects subtle changes in facial expression with a high degree of accuracy, giving...
Read More
SEACOM cutting off ISPs – “Nothing other than corporate greed”

SEACOM cutting off ISPs – “Nothing other than corporate greed”

Technology
MyBroadBand SEACOM’s decision to change its peering policy in South Africa from free and open peering to selective peering is “nothing...
Read More
Security expert warns of unprecedented phishing attacks in SA

Security expert warns of unprecedented phishing attacks in SA

Security
IT Web South Africa is witnessing an unprecedented increase in both simple opportunistic cyber attacks and complex targeted attacks, which are increasingly...
Read More
Spot the Phish

Spot the Phish

Security
Sophos 89% of phishing attacks are carried out by organized crime. Phishing emails lead to data harvesting or malicious code...
Read More
Safeguard your business against cyber threats

Safeguard your business against cyber threats

Security Uncategorized
IT Web In this digitally dominated world, nearly all businesses have an online presence. While embracing the digital playing field...
Read More
Cyber criminals aim to score with Rugby World Cup

Cyber criminals aim to score with Rugby World Cup

Security
IT Web With the Rugby World Cup underway, a security expert has warned that cyber criminals are match fit to breach the security...
Read More
South African websites hit by new Lilocked ransomware

South African websites hit by new Lilocked ransomware

Security
MyBroadBand A new form of ransomware called Lilocked (or Lilu) has been targeting Linux servers and encrypting website files, asking...
Read More
Half of Android smartphones open to attack by SMS

Half of Android smartphones open to attack by SMS

Security
IT Web Researchers at Check Point have discovered that certain Android-based phones, including models by Samsung, Huawei, LG and Sony, are...
Read More
Alarming Stats: Global cyber losses to reach $6 trillion in two years

Alarming Stats: Global cyber losses to reach $6 trillion in two years

Security
IOL The cyber threat is producing some alarming statistics. A report by Aon found that annual global cyber losses are...
Read More
10 ways to protect your business from cyberattacks

10 ways to protect your business from cyberattacks

Security
MyBroadBand One of the biggest threats businesses face in 2019 is cybercrime. There are many malicious parties online who are...
Read More
Government’s telecoms plan is a mess – Telkom CEO

Government’s telecoms plan is a mess – Telkom CEO

Telecommunications
MyBroadBand Telkom CEO Sipho Maseko has criticised the National Treasury’s recent discussion paper on economic transformation. Maseko has written a...
Read More
Half of cybersecurity incidents are man-made

Half of cybersecurity incidents are man-made

Security
IT-Online Despite automation, the human factor can still put industrial processes at risk: employee errors or unintentional actions were behind...
Read More
A significant number of operators have already deployed 5G

A significant number of operators have already deployed 5G

Telecommunications
Tech Central About 7% of telecommunications operators worldwide have already deployed 5G wireless network infrastructure, with the pace of roll-out expected...
Read More
Smart cities top Gartner’s hype cycle for Africa

Smart cities top Gartner’s hype cycle for Africa

Technology
ITWeb Smart city frameworks, the Internet of things (IOT) and low earth orbit satellite systems are the three technologies that will transform business in...
Read More
Trends that are transforming the ICT channel

Trends that are transforming the ICT channel

Technology
The distribution game is changing significantly. Twenty years ago, it was about box dropping, but the ongoing digitisation of practically...
Read More
Ransomware modifications double in a year

Ransomware modifications double in a year

Security
ITWeb Researchers from Kaspersky have discovered 16 017 new ransomware modifications in Q2 2019, some of which belong to eight...
Read More
Dangerous security flaws in Windows 10 – Update now

Dangerous security flaws in Windows 10 – Update now

Security
Jamie McKane - MyBroadBand A number of security vulnerabilities have been discovered in Windows 10. The security flaws are similar...
Read More
Spammers exploiting legitimate company websites

Spammers exploiting legitimate company websites

Security
IT-Online Malicious Internet users are increasingly exploiting registration, subscription and feedback forms on websites to insert spam content or phishing...
Read More
Microsoft launches Azure Security Lab

Microsoft launches Azure Security Lab

Security
Bradley Prior - MyBroadband Microsoft launched its Azure Security Lab at the Black Hat 2019 conference, VentureBeat reports. Azure Security Lab is...
Read More
How VR could drive interest in space travel

How VR could drive interest in space travel

Technology
Bloomberg – MyBroadband On May 25, 1961, U.S. President John F. Kennedy said Americans would land a man on the...
Read More
The legalities of the digital signature

The legalities of the digital signature

Security
By Rian Schoeman, Etion Secure (Incorporating Lawtrust) - MyBroadBand Digitalisation and digital transformation have seen a significant organisational shift from...
Read More