Mikko Hypponen: Three types of online attacks

Mikko Hyppönen is a global security expert and the resident Chief Research Officer at F-Secure. He is also the keynote speaker at the upcoming ITWeb Security Summit in Johannesburg on

Share
How does the Facebook data leak affect you?

As you have no doubt heard, Mark Zuckerberg is facing serious allegations concerning the data leak that has Facebook users up in arms. It has been revealed that Facebook negligently

Share
Encryption backdoors and how they affect you

Encryption is the process of encoding and decoding messages so that only authorised people can view the contents of the message. Computers today have allowed the use of much more

Share
Protect your privacy on Facebook 

  Facebook is one of the most popular platforms used by more than half of the world’s population. However, Facebook’s latest attempts to connect people on the Internet have left

Share
What is an Evil Maid attack?

What is an Evil Maid attack?   An evil maid attack is a security exploit that is characterised by the attacker’s ability to physically access a computing device that has

Share
Cryptojacking – A new glitch in the system

Cryptojacking – A new glitch in the system    Cryptocurrencies such as bitcoin do not emerge from central banks like the money we use daily; they are generated or “mined”

Share
Saving passwords on a phone

Saving passwords on a phone    Writing down your passwords and keeping it somewhere safe, such as your wallet, is always a good route to take.  Encrypting your passwords, then writing them

Share
Password protection is the way forward 

Password protection is the way forward    Creating strong passwords has become the biggest burden of today’s generation. So many different accounts are created during the online “struggle” to have

Share
RANSOMWARE: HOW TO PREDICT, PREVENT, DETECT & RESPOND 

RANSOMWARE: HOW TO PREDICT, PREVENT, DETECT & RESPOND    Ransomware is one of the most prominent cyber threats today. Yet just like any other threat, F-Secure advocates for a four-phase

Share
3 Tips to Secure your Smartphone

3 Tips to Secure your Smartphone   We all have that feeling where we don’t do enough to protect our devices other than having a weak password. Your smartphone is

Share