How Hackers Get your Passwords
The hard truth is that no matter where your password is stored, even with password managers, it can still and…
Why Chose VPN over HTTPS
VPN or HTTPS cannot protect you online, you have to be conscious of how and what you do online. Neither…
Cryptocurrency Attacks
As in all I.T systems, vulnerabilities are unavoidable. In cryptocurrency infrastructure, “vulnerabilities in smart contracts, wallets, and web applications have…
How Cryptocurrency Works
Digital currencies are transferred to others via their public key (i.e. the public key is a unique identifier of the…
Twitter breach caused by Social Engineering
The cause of the recent Twitter breach was social engineering. A type of attack where people are tricked by hackers…
How Phishing Works
You may not realise it, but you are a phishing target at work and at home. You're the most effective…
South Africa’s Postbank Master Key Stolen
The stolen master key was used to "access accounts and make more than 25,000 fraudulent transactions, stealing more than $3.2…
Simple Steps to Stay Secure Online
Technology alone cannot fully protect you; you are your best defense. Ultimately, the greatest defense against attackers is you. By…