After pop star Katy Perry's Twitter account was breached this morning, analysts say hacking an account that large has numerous implications.
|FREE NEWSLETTERS||IT DIRECTORY||NEWS ALERTS||RSS||NEWS TIP-OFFS||ADD TO FAVOURITES|
|Advertise on ITWeb||Wed, 01 Jun, 05:36:38 AM|
The latest global software survey shows the value of unlicensed software in use in SA sits at $274 million.
Working with Bradford Networks, the companies will provide a network access control solution for both wired and wireless access services.
Many companies are still not taking strong enough measures to defend against e-mail-based threats, say experts.
The power to effectively identify and understand the attacks that bypass your defences is critical in order to respond quickly, says Bryan Hamman, territory manager for Sub-Saharan Africa at Arbor Networks.
It has released the latest version of its award-winning data visualisation and reporting suite, as well as its security-hardened operating system.
Networks Unlimited recommends a comprehensive suite of Distributed Denial of Service protection tools to deal with threats such as Petya ransomware.
It makes more sense to ensure existing legislation is enforced rather than to introduce another law to address cyber crime.
Phishing increasingly turns to highly targeted whaling attacks, as syndicates aim for greater financial gain.
Ransomware – how three IT leaders secure their networks and users.
Two professional blackhats open up about how they work, who hires them and how they get paid.
What is the rationale behind the sovereign and corporate industrial espionage strategic intent, and how it is done?
As the Internet of things gathers steam, new technologies could greatly enhance a company's workforce.
Charlie Miller has hacked your phone, your web browser, and now he's coming for your car.
Credit card data and consumer identities are being harvested in coordinated attacks on retail organisations.
Infoguardians SecureMS offers customers a modular approach with granular reporting, along with detailed graphical trend analysis. This will trigger alerts which are then passed on to a team of support engineers responsible for arrective measures necessary. The service is fully automated and is monitored 24x7x365. Click here for more information.