Cyber security
Google launches strong encryption for Android messages
The move brings additional privacy and security to Google's messaging application, but comes amid rising complaints from law enforcement agencies around the...
According to the 'SonntagsZeitung' newspaper, they accessed the universities' payment systems and changed the instructions on salary transfers, stealing a six-figure sum.
Accounts targeted for heightened security include federal and state politicians; political parties; candidates; presidential campaigns, and journalists who cover them.
Experian SA CEO Ferdie Pieterse maintains numbers not as high as Sabric reported. Bruce Whitfield grills him for an explanation.
The FBI’s San Francisco division is leading an inquiry into the hacking, with many Washington lawmakers also calling for an accounting of how it happened.
The feature began rolling out to the Messenger app tailored for Android-powered smartphones in March and will head to Messenger on iPhones next week, according to Facebook.
The bank said it investigated a security issue that occurred at the premises of a service provider called Computer Facilities.
Privacy law specialist Rohan Isaacs said that South Africa was lagging behind in its protection of personal information laws, leaving the public vulnerable to internet scams.
The City of Johannesburg’s networks were already breached twice this year. And the public has been warned that corporates were not the only victims of such attacks.
The American AI Initiative executive order calls for the administration to "devote the full resources of the federal government" to help fuel AI innovation.
The committee collected data from social media companies that was used by the private analysts in their analysis.
Facebook said in an email to Reuters that it was cooperating with the Federal Bureau of Investigation on this matter.
The event was meant to test the strength of US election infrastructure and details of the vulnerabilities would be passed onto the states, it added.
Information Regulator chairperson advocate Pansy Tlakula says new regulations should be in place by December, which will hold companies responsible for not having the appropriate security procedures in place.
The evolution of the cyber domain has significantly complicated this picture, not merely in terms of how armed forces adopt and adapt to new technology, but in terms of raising questions about what constitutes military use in a domain where civilian and military users are inextricably entangled.
The new group would be run by Intel human resources chief Leslie Culberstone who has worked in the chipmaker since 1979.
Two Gauteng companies have accused each other of being responsible for the leak of an estimated 33 million South Africans’ personal records.
An alert from the US Department of Homeland Security Computer Emergency Response Team on Monday said the flaw could be used within range of Wi-Fi using the WPA2 protocol to hijack private communications.
The attack appeared to target the firm’s US operations, was discovered in March and could have begun as early as October 2016, according to a report.