How Phishing Works
You may not realise it, but you are a phishing target at work and at home. You're the most effective…
South Africa’s Postbank Master Key Stolen
The stolen master key was used to "access accounts and make more than 25,000 fraudulent transactions, stealing more than $3.2…
Simple Steps to Stay Secure Online
Technology alone cannot fully protect you; you are your best defense. Ultimately, the greatest defense against attackers is you. By…
No one is immune to phishing attack
Phishing is real and no one is immune to phishing. One in 61 emails in your inbox now contains a…
Be Mindful of Social Media Privacy
Most people would never consider walking into a crowded room and loudly broadcasting to total strangers all the details of…
User Authentication: 2FA vs MFA
Authentication is the process of establishing that an entity is who they claim to be at a point in time.…
Twitter CEO’s account hacked via SIM-card swap attack
A SIM swap attack involves convincing your mobile phone provider to switch your phone number over to a SIM card…
Reduce Fraud with Payment Token
Payment Token is simply using a surrogate of the primary account number (PAN) of a payment card to process a…