Mimicking a standard Apple ID login page, attackers trick victims into entering their username and password on the phishing page.
Read more"...these RDP attacks can be targeted to focus on high-value individuals in the company such as the C-suite".
Read moreThe company said its security department 'immediately stopped attempts to artificially' order the taxis. However, this was not enough to...
Read moreBusiness-related voting has become the second most common type of poll held on the blockchain-based platform in 2022.
Read moreAchieving Zero Trust for an organisation requires several different solutions all working together dynamically, and modern NAC approaches have a...
Read more"Scam artists take advantage of the absence of regulation to advertise unlicensed brokerages on social media".
Read morePieter Engelbrecht – Datacentrix business unit manager: data management solutions, writes on protecting an organisation’s most valuable asset: Why a...
Read moreIt is estimated that by 2025, online gaming audiences will surpass 1.3 billion.
Read moreFraudsters launched phishing attacks on universities to steal private research and student information
Read moreWragby who earlier in the year became ISO 270001 certified has put in place standard measures that ensure the protection...
Read moreLastPass has deployed containment and mitigation measures, and engaged a leading cybersecurity and forensics firm
Read moreCompanies frequently organise wellness days for physical and mental health awareness, or team building and feel-good events, but few, if...
Read moreAccording to Kaspersky Security Network data for corporate users in South Africa, in Q2 2022 the number of users affected...
Read more‘The Most Hated Man on the Internet’ shows viewers just how quickly personal data can be hacked, stolen, and exploited....
Read moreOlatunji, said they were at NHIS as part of NDPB's awareness drive of sensitizing public sector on Data Privacy in...
Read more© 2025 TECHECONOMY.