I don’t need security software…

  When antivirus software is mentioned, there always seems to be someone who advocates that they don’t need an antivirus because they’re “careful. No matter how smart think you are, an antivirus on your device can only benefit you. The idea that antivirus software is only necessary for irresponsible users is a myth, even the most careful of users are vulnerable.   Many people think that you can only get malware by downloading suspicious files, running unpatched software, visiting sketchy websites and doing other irresponsible ... Read more

3 Trends in Cybersecurity that you need to know for 2018

3 Trends in Cybersecurity that you need to know for 2018 The world of cybersecurity is an ever-changing domain. New threats appearing on a daily basis and attackers are continuously evolving their techniques. Keeping up with the threats can be a difficult task. Cybersecurity continues to be a growing priority for organisations of all sizes and across all industries. 2017 was the year that brought us the biggest ransomware outbreak in history (WannaCry) and a data breach that exposed the personal information of nearly half the ... Read more

Meltdown and Spectre exploits

If you store any personal information on a computer, smartphone or web service, your data is at risk from two major computer security exploits: Meltdown and Spectre. What makes Meltdown and Spectre especially threatening is that they affect your computer at the hardware level – specifically the processors inside your device. These flaws exist not because of a bug in computer software designs, but as a result of a feature in computer hardware that’s been around since 1995. Processors are the chips ... Read more

Macros can be dangerous for your network

  Microsoft Office documents containing macros can be hazardous to the overall security of your network. Macros are bits of computer code used to automatically perform repeated tasks and historically have been notorious vehicles for malware. With more recent events such as the outbreak of ransomware and cryptojacking, the latest versions of Office include security features that will protect you from malfeasant macros.   Microsoft Office documents — Word, Excel, PowerPoint, as well as others — can contain embedded code written in a programming ... Read more

DDos attack violating UPnP vulnerability

  A recent disclosure of a new type of Distributed Denial-of-Service (DDoS) attack takes advantage of an infamous security vulnerability in the Universal Plug and Play (UPnP) networking protocol. This exploit allows attackers to bypass common methods for detecting their actions. This new form of DDos attacks are launched from irregular source ports, making it difficult to determine their origin and blacklist the ports in order to protect against future incidents.   A DDoS attack is an attack in which multiple compromised computer systems ... Read more

Mikko Hypponen: Three types of online attacks

Mikko Hyppönen is a global security expert and the resident Chief Research Officer at F-Secure. He is also the keynote speaker at the upcoming ITWeb Security Summit in Johannesburg on 22nd May. Mikko’s insight on how we can stop new viruses from threatening our online safety is different from the rest. His ability to make complex technical concepts easy to understand, separating fact from hearsay, and his detailed storytelling earn him the title of being the most influential worldwide authority on ... Read more

Mikko Hyppönen’s take on Online Security

May is the Month of Mikko as we publish numerous articles and blogs about some of the things he has said. Mikko Hyppönen is a global security expert and the resident Chief Research Officer at F-Secure where he has been employed since 1991. He is also the keynote speaker at the upcoming ITWeb Security Summit in Johannesburg on 22nd May. His TED Talk is the most watched computer security talk on the internet and with very good reason as Mikko’s insight ... Read more

How does the Facebook data leak affect you?

As you have no doubt heard, Mark Zuckerberg is facing serious allegations concerning the data leak that has Facebook users up in arms. It has been revealed that Facebook negligently permitted the profiles of up to 87 million people to be used by Cambridge Analytica, a political data-mining firm who specifically uses some form of profiling and micro-targeting to persuade voters.   Earlier this month, Facebook disclosed that information about tens of millions of its users was sold to this particular data-analytics firm, which worked ... Read more

Encryption backdoors and how they affect you

Encryption is the process of encoding and decoding messages so that only authorised people can view the contents of the message. Computers today have allowed the use of much more complex encryption systems because we can rely on the technology to do the extremely tough number-crunching required to decode encrypted messages.   A ‘backdoor’ in computing is a way of bypassing the normal method of authentication. Backdoors are often hidden in part of the design of the program or algorithm. A backdoor would ... Read more

Protect your privacy on Facebook 

  Facebook is one of the most popular platforms used by more than half of the world’s population. However, Facebook’s latest attempts to connect people on the Internet have left many users feeling overexposed. The world’s most popular social network made the decision to opt its 400+ million users into “Instant Personalization”, which instantly shared users’ “general information” with Facebook’s partner sites. In addition, Facebook’s new Community Pages automatically connect you to any topic, brand or personality that you’ve expressed any interest in.   When Facebook ... Read more
Next Page »