4 C
Johannesburg

Lessons from COVID-19 Cyberattacks: Where Do We Go Next?

We need to learn from the attacks and attempts that have occurred in order to prepare for the future. Read more

Stop the social engineering of customers and employees

To prevent fraud, it’s important to understand the social engineering lifecycle and how to stop manipulation of clients and staff.Read more

DHS Shares Data on Top Cyber Threats to Federal Agencies

Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)'s intrusion prevention system EINSTEIN. Read more

Edge reading data from other browsers without consent – Microsoft responds

Microsoft has provided comment on why its Edge browser has been found to import data from other browsers without consent. Read more

Fighting the pandemic: The advancing role of technology

COVID-19 will be a significant catalyst for digital transformation, particularly when it comes to alternatives to personal contact and touch interfaces.Read more

How Universities Should Prepare Students and Faculty for Travel Abroad Programs

A student missing after a catastrophic earthquake, a bus carrying students is involved in a fatal accident in an area with no cellphone connectivity, or a terrorist attack...

Latest article

Bugtraq: LPE and RCE in OpenSMTPD’s default install (CVE-2020-8794)

LPE and RCE in OpenSMTPD's default install (CVE-2020-8794) Read more

Online Shopping Portal 3.1 SQL Injection

Online Shopping Portal version 3.1 suffers from a remote SQL injection vulnerability. Read more

CVE-2020-15034

NeDi 1.9C is vulnerable to cross-site scripting (XSS) attack. The application allows an attacker to execute arbitrary JavaScript code via the Monitoring-Setup.php tet parameter....