BUSINESS TECHNOLOGY MEDIA COMPANY
Companies
Sectors
malware
1:50
Yesterday

Malware disguised as meeting apps spikes 1 000% in a year

Cyber threats disguised as meeting app invites have skyrocketed, according to data from Kaspersky.

2:10
Wednesday

IcedID banking Trojan joins most wanted list

IcedID makes use of other malware to proliferate and has been used in several ransomware operations.

2:10
Tuesday

Companies can’t avoid mobile malware attacks

In 2020, 97% of businesses experienced a mobile malware attack, according to Check Point.

4:30

Do you know your odds? Don’t bet on it

Online betting is legal in SA, but online gambling is illegal, a distinction that causes confusion exploited by online gambling sites dangling the hope of mega jackpots.

2:20

Fake Netflix app spread via WhatsApp found on Google Play

Malware lurking in a fake 'FlixOnline' app was discovered by Check Point Research.

4:10

Advanced threat actors up their obfuscation tactics

An advanced cyber espionage campaign first discovered in Vietnam may spread to other regions, warns Kaspersky.

1:00

eBook: Six best practices for effective Linux security management

In some instances, Linux systems have been compromised and configured to distribute malware.

3:00

Ransomware exploits inter-departmental gaps to bring business down

A GlassHouse webinar on cyber recovery will be hosted in partnership with ITWeb and Dell on 21 April.

1:50

META enterprises ramp up security teams

Businesses, and large enterprises in particular, need skilled professionals to protect themselves from ever-evolving cyber attacks, says Kaspersky.

3:40

Nearly 80% lack confidence in their organisations’ cyber security posture

An Insight Enterprises-commissioned IDG survey reveals ongoing security challenges are tied to distributed IT and work-from-home environments.

5:30

People-centric security: Empower your people to protect your organisation

Cyber criminals continue to increasingly target a company's people rather than its networks or infrastructure.

5:10

SA companies must consider cyber security

Winjit helps businesses review their data sources and identify weak spots.