The vulnerability affects all systems using Secure Boot, meaning the majority of laptops, desktops and servers.
The uBreach functionality within Securicom’s uSecure can identify exposed e-mail accounts and identities that have been publicly disclosed online, says Douw Gerber, business development manager at Securicom.
Organisations need to focus on reducing the attack surface of their endpoints, says Panda Security.
The Directorate for Priority Crime Investigation says the accused were plotting to pillage SASSA by hacking into the social security agency’s system.
The notorious state-sponsored APT group has created its own ransomware .
It is important to maintain employee awareness of cyber security risks, which can be done remotely in most cases, says Martin Potgieter, co-founder and technical director at Nclose.
The report finds malicious Microsoft Office files are on the rise and that ransomware is up in the US and globally.
The cyber criminal’s target is not only the individual, but also the tax professionals who prepare and file taxes for many clients, says Carey van Vlaanderen, CEO at ESET South Africa.
The company becomes a victim of a cyber attack that encrypted some of its systems, less than a year after its South African unit was hacked.
Microsoft arguably now matches and exceeds the protection you can achieve with point solutions, says Cloud Essentials.
To ensure sufficient mobile device security, the technology giant incorporates its chip, device and cloud capabilities.