What it takes to become an ethical hacker

  Jobs in the cyber security market are on a steady incline with the increase in internet usage worldwide together with the demand for a skilled workforce to accommodate this

Share
The real value of your data

  Over and over, you’ve probably been advised that you should protect your private data. This typically means that, in addition to updated application and internet security software, you should use a trusted VPN that

Share
The importance of finding connections in the Global Village

  Global Village, a phrase originally framed by Marshall Mcluhan, is defined as: “the world viewed as a community in which distance and isolation have been dramatically reduced by electronic

Share
Macros can be dangerous for your network

  Microsoft Office documents containing macros can be hazardous to the overall security of your network. Macros are bits of computer code used to automatically perform repeated tasks and historically

Share
DDos attack violating UPnP vulnerability

  A recent disclosure of a new type of Distributed Denial-of-Service (DDoS) attack takes advantage of an infamous security vulnerability in the Universal Plug and Play (UPnP) networking protocol. This

Share
Mikko Hypponen: Three types of online attacks

Mikko Hyppönen is a global security expert and the resident Chief Research Officer at F-Secure. He is also the keynote speaker at the upcoming ITWeb Security Summit in Johannesburg on

Share
How does the Facebook data leak affect you?

As you have no doubt heard, Mark Zuckerberg is facing serious allegations concerning the data leak that has Facebook users up in arms. It has been revealed that Facebook negligently

Share
Encryption backdoors and how they affect you

Encryption is the process of encoding and decoding messages so that only authorised people can view the contents of the message. Computers today have allowed the use of much more

Share
Protect your privacy on Facebook 

  Facebook is one of the most popular platforms used by more than half of the world’s population. However, Facebook’s latest attempts to connect people on the Internet have left

Share
What is an Evil Maid attack?

What is an Evil Maid attack?   An evil maid attack is a security exploit that is characterised by the attacker’s ability to physically access a computing device that has

Share