The scammers are changing the way they can trick people out of their savings.
Reports of a drop in the number of people caught in online fraud is to be welcomed. But scammers are already changing their plans to bypass existing safeguards.
What would you do if your files were locked away?
Here's how to protect yourself from the latest online scourge of hackers encrypting your files and demanding a ransom to unlock them.
An out of date operating system can let the hackers in to your computer network.
Microsoft warned back in 2014 that anyone continuing to use Windows XP, once it ended support, would be vulnerable to attack. So why are some organisations still using the old operating system?
2015 saw us complete our exploration of all nine planets (including dwarf planet Pluto) in our solar system.
2015 was a year where we expanded our view of the universe, embraced new technologies and got a hint of the profound changes to come.
If an online offer seems too good to be true, it probably is and you’re being phished.
Phishing attempts tend to rise during the festive season when people are more likely to respond to online marketing and to spend more money. How can you protect yourself?
The fingerprints might indicate China, but that’s not so easy to prove.
This week's hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it's notoriously difficult to pinpoint the origin of a hack.
Phishing is a growing problem across Africa. South Africa has the highest number of victims.
Cyber security has been identified as a global challenge, with Africa facing renewed threats through increasing internet use across many platforms.
UK plc has a cybersecurity mountain to climb.
Strange calls, emails, or disappearing bank balances – how online criminals use stolen card details.
Online crime isn’t as new as all that but it does now count.
Olivier Le Moal/shutterstock.com
An increase in the crime figures doesn't necessarily mean an increase in crime.
There are a few things you can do to keep yourself safe online.
Getting the basics of cybersecurity right could eliminate 85% of the threats overnight. Here are some tips to get you started.
Cyber criminals have found a way to harvest data from iPhones and iPads using the weak point in Apple's otherwise top security system - app developers.
Apple’s ‘walled garden’ might be frustrating, but it does protect your devices from being hacked.
Jailbreaking your iOS device can free you from Apple's 'walled garden', but it's a Wild West beyond the walls.
Giving away the keys to cybercriminals.
Intel Free Press/flickr
Intel has used the 5th anniversary of their purchase of security company McAfee to release a review of how the cybersecurity landscape has changed in that time. There are a number of surprising observations…
Cyber crime costs South Africa between R2,5 billion and R5,8 billion annually.
South Africans are being targeted by cyber criminals. Consumers are fleeced because their passwords make them vulnerable.
Not enough legislation.
Most African countries lack legislation to protect people from online crime and abuse.
IWF moves will control only the most visible child abuse images online.
Cybercrime by hamburg_berlin/shutterstock.com
The Internet Watch foundation is to share its database of abusive image digital signatures in a drive to clean up the internet.
There’s a dark side to the internet.
There's a dark side of the internet, where almost anything goes, or can be bought for the right price.
No one is immune from cyber crime… no matter how protected you think you are.
If you think you're not at risk from cyber crime then think again. Everyone connected to the internet is a potential target and hackers are gathering what they can to try to gain your trust.
Tell no one… that we’ve just lost all your data.
When hackers take down companies in response to their actions, security chiefs need to know what the CEO is saying in public.