Coffee vs Digital Security

Coffee vs Digital Prosperity

“If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked”. ― Richard Clarke Contemporary information and communication technologies (ICT), often called digital technologies, are firmly embedded in modern societies. The space hosting these technologies, also known as a cyberspace, is continually shifting as new […]

Digital future

Who will protect our digital future, Mr President?

A few days ago, President Cyril Ramaphosa announced a package of immediate economic reforms and spending plans in an effort to boost South Africa’s sluggish economy. This, among others, includes boosting tourism, business travel and agriculture, allocation and use of high-demanded radio spectrum, mining, township economy and the infrastructure projects. It is needless to prove […]

Bury head in the sand

Burying head in the sand is yet another way to the cybersecurity Armageddon

The US-based Centre for Strategic and International Studies (CSIS) announced last Wednesday the annual cost of cybercrime for the global economy amounts to USD 600 billion or 0.8% of the world’s Gross Domestic Product (GDP). This is an increase from a 2014 study that put global losses at about USD 445 billion! The Ponemon Institute […]

Cybersecurity Armageddon

Are we heading towards cybersecurity Armageddon in South Africa?

The newest cyber-attacks of a self-confessed hacker, known as Paladin, on the government departments’ and agencies’ websites showed unpreparedness of these entities to protect their informational assists. As we warned before, if nothing significant changes, South Africa will inevitably head towards cybersecurity Armageddon. A number of reports in the last two years revealed that the […]

Watering Hole

Watering Hole is Streaming Again

It is predicted by cybersecurity professionals that almost forgotten “Watering Hole” attacks will be one of the major threats to our digital well-being in 2018. These attacks recently re-emerged after almost three years and are now, in its more sophisticated version, gaining in popularity among e-criminals. The cybersecurity professionals now that the “Watering Hole” attacks […]

BRICS Alternative Internet: Cybersecurity Implications for South Africa

The Russian government seeks to create its own system of root name servers, which is supposed to include the BRICS and possible the Shanghai Cooperation Organisation (SCO) countries. This will ultimately be an ‘alternative Internet’, which will have its own cybersecurity concerns. The Russian authorities, heavily influenced by the ideas of ‘cyber-sovereignty’, promoted by the […]

BYOD mobile phishing

BYOD is the Hottest Phishing Attraction

The newest cybersecurity trends show that portable devices are used as a primary doorway for mobile phishing attacks aimed at stealing personal credentials and corporate data. In fact, it was recently revealed that mobile users are 18 times more likely to be attacked by the phishing tries than attacked by malware. It seems that the […]

insider threat

Insider Threat: Often neglected cybersecurity hazard

Although there might be numerous combinations of human circumstances and unfortunate contexts that can trigger an insider threat, the main drivers behind these kinds of threats are human greed, anger, curiosity and unawareness or carelessness. Bizarre stories Immigration officer An immigration officer tried to rid himself of his wife by adding her name to a […]

digital mosquito

Digital MOSQUITO can bite your precious data

A recently discovered hacking technique allows adversaries to extract precious data from your computers even if  the devices are physically disconnected from any network, including the Internet. This is a must-read for those mandated to protect sensitive organisational data. Digital MOSQUITO at work In computing, an ‘air gap is a network security measure which ensures […]

cryptocurrency

Cryptocurrency (in)secure world: to Bitcoin or not to Bitcoin?

The skyrocketing value of cryptocurrencies has ushered in a new wave of financial cybercrime. These blockchain exploits and mining schemes are growing more sophisticated and more effective every day as investors flock to buy up digital funds. Users should closely monitor their cryptocurrency wallets and implement robust endpoint security measures to protect their increasingly valuable […]