Trojan Software – an example:

Trojan software are making their rounds again and again and again (see previous post) Here is a prime example that Reuters reported: “An online voyeur was jailed for four years […]

Read more

WARNING – Latest mobile phone hack !

As predicated, hackers are now aiming at the mobile phones (see previous post). Here is an example of that latest software that you can fall victim to – don’t say […]

Read more

Virtual Private Network – what are they ?

I have been asked to put together a brief overview of what is a VPN and why you should use one… so  here is the story – You have read […]

Read more

Take over your phone from your PC – FREE Software !

I have just come across this awesome piece of software which I must share with you. This is a FREE utility that you install on your pc which allows you […]

Read more

The biggest hacking threat – the internal user

before you get all worked up  – let me explain… When a hacker is looking to penetrate a network, they look for the obvious open doors (in geek talk – […]

Read more

Yet another hacked bank account

This was reported in the Cape Argus on July 5th – The short version: a business man used an internet cafe to log onto his Standard Bank online banking. This […]

Read more

The Trojans are coming !

Well it’s time to chat about those Trojans – FYI – for those who don’t know what Trojans are (frankly that is scary all by itself): Trojans are small programs […]

Read more

Superb – Can’t Steal what you can’t see !

Now this is the level that we as South African have had to come down to in order to protect ourselves. The device is a Fog Generator. WHEN someone breaks […]

Read more
1 200 201 202 203 204 210