Hackers exploit QR codes in PDF e-mail attachments to steal company credentials from mobile devices.
The public works and infrastructure department enlists the Hawks and State Security Agency, as it tries to curb further losses due to what it terms a “Sage breach”.
Five things you can do right now to protect your business.
The new standards require financial institutions to implement comprehensive cyber security frameworks, policies and governance practices to secure their operations.
The scheme uses legitimate employee names to deceive companies into accessing fraudulent websites, putting sensitive data and financial assets at risk.
Companies that depend on security controls associated with traditional monitoring solutions often lack visibility into their technology assets.
With cyber crime on the rise, it is imperative to implement new, intelligent privilege controls.
The 'Juice' agenda was tailored to address how companies can actively combat cyber crime beyond the traditional tactics of monitoring and reporting.
Netskope Threat Labs tracked a 2 000-fold increase in traffic to phishing pages delivered through Microsoft Sway.
With its dynamic, decentralised architecture, Rajant's Kinetic Mesh technology delivers security, reliability and adaptability, says Teresa Huysamen, business unit manager at Duxbury Networking.
To achieve full value from pentesting, modern penetration testers need to be as creative and devious as cyber criminals.