0 comments

Should you really pay ransom settlements?

By Industry Contributor 12 September 2022

Fortinet’s Aamir Lakhani answers some key questions about ransomware, discusses whether victims should pay up, and details how to prevent it in the first place. FULL STORY >

0 comments

Chinese, Russian Partnerships in South Africa Should Extend to the Cyber Realm

By Staff Writer 9 September 2022

If South Africa truly is in alliance with countries like Russia and China, questions really should be asked why these two allied countries refuse to support South Africa in its struggles against disinformation and... FULL STORY >

0 comments

Interview with Trend Micro: Addressing gender under-representation in cybersecurity

By Ryan Noik 8 September 2022

Tarryn Maitland, Regional Account Manager at Trend Micro, addresses the issue of underrepresentation of women in technology. Ryan Noik chats to her about what is impeding its progress and what Trend Micro... FULL STORY >

0 comments

Chilling Netflix docuseries an important reminder to strengthen passwords

By Staff Writer 29 August 2022

The Most Hated Man on the Internet shows viewers just how quickly personal data can be hacked, stolen, and exploited. FULL STORY >

0 comments

AI & ML to your defence in an evolving cyber threat landscape

By Industry Contributor 26 August 2022

Nowadays, threat actors are leaning on new tools and techniques to improve the efficiency of their attacks. Only artificial intelligence (AI) and machine learning move quickly enough to defend organisations in this evolving cyber... FULL STORY >

0 comments

AI and ML reliability and security: BlenderBot and other cases

By Staff Writer 23 August 2022

Kaspersky unpacks BlenderBot, chatbots and what they reveal about the reliability of machine learning and AI. FULL STORY >

0 comments

Remote Desktop Protocol attacks constitute 75% of company access sold on the Darknet

By Staff Writer 16 August 2022

Selling access to corporate infrastructure is one of the most popular topics on Darknet forums currently, accounting for 12% of all messages in trade forum sections analysed. FULL STORY >

0 comments

Hybrid work security: A zero trust model to protect the future workplace

By Staff Writer 16 August 2022

Though remote work and the hybrid working model have proven beneficial for employee well-being, inclusion and productivity, there have also been pitfalls – most notably on the security front. FULL STORY >

0 comments

Apple’s new Lockdown mode: What it tells us about the mobile security landscape

By Staff Writer 15 August 2022

The development and release of Apple’s new Lockdown Mode feature stresses the importance of mobile security and raises some interesting questions about the state of cybersecurity. FULL STORY >

0 comments

Cyber-Wellness Means Cyber-Aware

By Staff Writer 4 August 2022

Tired? Stressed? Distracted? The overwhelm of 2022 is affecting how people respond to cybersecurity threats. FULL STORY >

0 comments

On the road again? Here’s how to stay cyber safe

By Industry Contributor 2 August 2022

Doros Hadjizenonos, Regional Director Southern Africa, Fortinet addresses how to stay cybersafe as travel opens up again. FULL STORY >

0 comments

Phishing and scams expanding significantly this year

By Staff Writer 2 August 2022

Phishing and scams have hit the roof with a 234% increase in the number of detections in Africa in Q2 2022, according to Kaspersky. FULL STORY >

0 comments

Newly released ESET Threat Report details how war in Ukraine has changed the threat landscape

By Industry Contributor 30 July 2022

By Roman Kováč, Chief Research Officer at ESET FULL STORY >

0 comments

IBM Report: South African Data Breach Costs Reach All-Time High

By Staff Writer 29 July 2022

According to a recent IBM report, organisations lagging in zero trust adoption suffered higher losses while millions of Rands were saved through leveraging security AI and analytics. FULL STORY >

0 comments

New malicious campaign hunts Discord messenger users via infected open-source packages

By Staff Writer 29 July 2022

On July 26, using the internal automated system for monitoring open-source repositories, Kaspersky researchers identified a malicious campaign dubbed LofyLife. FULL STORY >

(Page 10 of 35) 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 |

Read
Magazine Online
TechSmart.co.za is South Africa's leading magazine for tech product reviews, tech news, videos, tech specs and gadgets.
Start reading now >
Download latest issue

Have Your Say


What new tech or developments are you most anticipating this year?
New smartphone announcements (44 votes)
Technological breakthroughs (28 votes)
Launch of new consoles, or notebooks (14 votes)
Innovative Artificial Intelligence solutions (28 votes)
Biotechnology or medical advancements (22 votes)
Better business applications (132 votes)