Read time 4:00

'Smart cameras turned into surveillance tools'

Attackers can remotely disable these devices, execute arbitrary malicious code on them and commit other acts of malfeasance, warns Kaspersky Lab.

Applying creativity to IT security

Anna Collard's company uses inventiveness and playfulness to engage users and make them interested in cyber security.

Huge opportunity for cyber security professionals


Two cyber security certifications available through Jumping Bean are EC-Council Certified Security Analyst and Certified Ethical Hacker.

Microsoft debuts a security masterclass

This will be held on 26 March from 8am to 4pm at Microsoft Johannesburg, 3012 William Nicol Dr, Bryanston.

Slingshot gives attackers full control over infected devices


The threat has been used for cyber espionage in the MEA from at least 2012 until February this year, says Kaspersky Lab.

Cybersecurity firm analyses Olympic Games malware

The Olympic Destroyer malware employed a highly sophisticated false flag to throw threat hunters off the scent of its real origin, says Kaspersky Lab.

Yahoo offers $80m to settle data breaches lawsuit

9 Mar

If approved, it will create a strong precedent to claim damages from breached companies, says High-Tech Bridge.

Airline Emirates 'leaking customers' sensitive data'

Personal data is being shared with third-party marketing partners, says Konark Modi, a data security engineer.

Kaspersky Lab offers $100 000 for finding bugs

Its bug bounty program now includes rewards of up to $100 000 for finding vulnerabilities in its products.

Cyber criminals borrow APT techniques to install mining software

With the aim of earning crypto-currency, criminals have started to use mining software in their attacks, says Kaspersky Lab.

GitHub was 'most powerful DDOS in history'

The breach employed a DDOS technique that is growing in popularity as it needs no botnet, warns Akamai.

Uber's huge cyber security failure

In November 2017, it was found out that Uber had been breached and the records of 57 million people were stolen, says Encryptech.

WordPress users warned of malware impersonating ionCube files

28 Feb

The malicious code is used by attackers to create backdoors on vulnerable Web sites allowing them to steal data or plant additional malware.