For the first time, more than half of the world's population is now using the Internet, but only a quarter of those in Africa, according to the ITU.
The African Wildlife Foundation joins forces with Irdeto to stop the selling of animal parts on the Internet.
The availability of feature phones with no Internet access will slow down government's connected citizen ambitions.
ITWeb, in partnership with MTN Business, is running a survey on ICT maturity to gain a clear, data-driven understanding of where SA businesses stand in terms of ICT maturity. The survey covers everything from infrastructure and cybersecurity to digital literacy and compliance.
To gather further insights into ICT maturity within respondent organisations, the survey poses the following questions:
By completing the questionnaire, you’ll contribute to this local research project and stand a chance to win a Takealot voucher to the value of R3 000. The detailed results of the survey, and the prize winner, will be published on ITWeb.
The attacks, dubbed DarkVishnya, all use an unknown device directly connected to the target's local network, says Kaspersky Lab.
New local digital asset trading platform gives South Africans access to crypto-currencies, and the option to buy and sell more than 50 crypto-currencies.
Six in 10 consumers globally feel online shopping, social media and banking sites pose a risk to their personal data security, according to Gemalto.
The telco has launched MusicTime, a fully inclusive time-based music streaming service.
Facebook's Transparency Report shows few requests are made for user data in African countries, compared to requests from the US, India and European countries.
Cyber crime is at an all-time high and this December is going to be the most dangerous yet, says John Mc Loughlin, CEO of J2 Software.
The Internet service provider offers a preview of the pre-fabricated data centre facility in Rosebank.
CodeJIKA wants one million young South Africans to try their hand at coding this week for international Computer Science Education Week.
The Trojan gives threat actors complete access to the victim's machine, allowing them to steal files, credentials, collect screen grabs and access the camera and microphone.