Reports of a drop in the number of people caught in online fraud is to be welcomed. But scammers are already changing their plans to bypass existing safeguards.
What would you do if your files were locked away?
Shutterstock
Microsoft warned back in 2014 that anyone continuing to use Windows XP, once it ended support, would be vulnerable to attack. So why are some organisations still using the old operating system?
2015 saw us complete our exploration of all nine planets (including dwarf planet Pluto) in our solar system.
NASA
Phishing attempts tend to rise during the festive season when people are more likely to respond to online marketing and to spend more money. How can you protect yourself?
The fingerprints might indicate China, but that’s not so easy to prove.
Shutterstock
This week’s hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it’s notoriously difficult to pinpoint the origin of a hack.
Phishing is a growing problem across Africa. South Africa has the highest number of victims.
shutterstock
Cyber criminals have found a way to harvest data from iPhones and iPads using the weak point in Apple’s otherwise top security system - app developers.
Apple’s ‘walled garden’ might be frustrating, but it does protect your devices from being hacked.
Faris Algosaibi/Flickr
Intel has used the 5th anniversary of their purchase of security company McAfee to release a review of how the cybersecurity landscape has changed in that time. There are a number of surprising observations…
Cyber crime costs South Africa between R2,5 billion and R5,8 billion annually.
SHUTTERSTOCK