Malware
3:20
Apr 18, 2019

Industrial cyber crime reaches 'pandemic proportions'

Industrial cyber crime levels have escalated significantly over the past year, as criminals stop at nothing to bring city metros to their feet.

2:00
Apr 18, 2019

The Web is dark, and full of phishers

Cyber criminals are cashing in on the popularity of Game of Thrones to spread phishing scams, says Check Point.

3:20
Apr 15, 2019

Attack traffic up by 32% in 2018

F-Secure survey data suggests many companies may not have the visibility they need to catch attacks that make it past firewalls and endpoint protection.

3:40
Apr 10, 2019

Cyber-risk and readiness review saves time, money

CS-IT believes in the Pareto Principle, that 80% of your risk can be mitigated by addressing the top 20% of the causes.

5:30
Apr 10, 2019

Phishing threats 2019: experts tell all

User education and continued inter-company communications around how best to avoid phishing attacks are vital, says Networks Unlimited Africa.

4:10
Apr 9, 2019

Be proactive about your cyber security

The threat of cyber attack is increasing exponentially in our digital world. Enterprises seeking to avoid becoming another crime statistic need to be proactive in how they implement cyber security.

3:30

SonicWall report details rise in targeted attacks

The company's research reveals 19.2% of malware attacks used non-standard ports, a year-over-year increase of 8.7%.

3:30
Mar 8, 2019

Crypto-jacking: A hidden cost for your company

Cyber criminals are using malware to hack into devices and use them to trawl the Web, consuming their resources to mine crypto-currencies.

3:10

Cisco presents 2019 Threat Report

Twenty-five percent of companies in MEA lack cyber security personnel, which is one of the biggest obstacles to cyber security.

2:50
Mar 6, 2019

Cisco reveals today's critical threats

Defending against today's critical threats looks back at the threat landscape over the past year.

3:00

Go hunting to mitigate damage by taking action sooner

Threat hunting helps discover processes, configurations or vulnerabilities which can be acted upon to improve security, says SecureData.