News

September, 2014


09/05  Security is about the customer, not the company

09/04  E-Retailers must make customers feel secure

09/03  SSL pushed for by Google while security is badly needed

August, 2014


08/29  Cybersecurity concerns continue to haunt the global landscape

08/28  How to protect sensitive banking information

08/27  Are companies getting the most from their SSL certificates?

08/26  Credit card vulnerability demonstrates need for better data security solutions

08/25  Can organizations trust their encryption provider?

08/22  High-quality cybersecurity offers job security too

08/21  Manage SSL certificates for HIPAA compliance

08/19  What kind of SSL certificate meets your needs?

08/18  Google gives SSL certificates their proper due

08/14  Preparation is key to mitigating a data breach

08/13  How to plan for a data breach in today's cybersecurity climate

08/12  It's time for the energy industry to get serious about cybersecurity

08/11  How to stay compliant with PCI guidelines

July, 2014


07/07  Rise of Bitcoin: E-commerce firms accept digital currency as payment form

07/03  Malware around the world: Brazilian, Russian and Spanish infections

07/02  Cloned banking app illustrates the need for boosted security

07/01  Do I need an SSL: Why security is critical for any online business

June, 2014


06/30  Fear of data breaches: Companies work to bolster cybersecurity

06/27  How to choose the right SSL: Top considerations to make

06/26  The effects of cyberattacks: Traffic jams and blackouts

06/25  Rise in cloned apps: Malicious imposters putting mobile users at risk

06/24  Slow implementation of SSL security puts LinkedIn users at risk

06/23  Data breach anticipation: Preparing for a security incident

06/19  Lessons learned from recent high-profile data breaches

06/18  Small business data breaches becoming inevitable: Prevention and preparation strategies

06/17  Cybercriminal activity: Domino's Pizza blackmailed by hackers

06/16  A decade of mobile malware: Worst threats and the current environment

06/12  Security breach trends: Cost, attack strategies and mitigation techniques

06/11  Malware and hacking in the real world: Police infected with ransomware

06/10  International hacking crackdown: 90 arrested as police work to stop Blackshades malware

06/09  UK government works to bolster enterprise security

06/02  Survey finds hacker technologies winning out over business cybersecurity capabilities

May, 2014


05/30  Instances of data breaches on the rise: Current World Cup malware

05/28  Research shows healthcare security is worse than retail

05/27  Zeus and Carberp: New malware combines two pre-existing malicious codes

05/23  Study finds rising trend of fake SSL certificates

05/23  Updating security plans: Traditional approaches outdated

05/20  Point of sales attacks: How they happen and how to prevent them

05/19  Banks need to shore cybersecurity practices

05/16  E-commerce trends to watch: Mobility, data, security

05/15  Top strategies for protecting business data: The basics explained

05/14  The changing face of cybersecurity: Dead technology and emerging crimes

05/13  Increasing collection of customer data puts businesses at higher risk of data breaches

05/12  Businesses need a multi-layered security approach for malware protection

05/09  Department of Financial Services seeks to tighten New York bank security

05/08  CryptoLocker may have moved to the mobile platform

05/07  SSL overview: What they are, why they're needed and how to select the right one

05/06  Data breach costs on the rise: Securing mobile endpoints

05/05  Big data privacy and security: Federal research, obstacles and tips

05/02  Mobile malware: OS-targeted malware and prevention tips

05/01  Healthcare's security battle: Mobile device protection tips

April, 2014


04/30  Vishing: Rise in VoIP phishing attacks

04/29  Rising instances of data breaches: 200 million records stolen this year

04/28  Top 3 scariest malware samples

04/25  Study finds alarming security weaknesses in healthcare technology

04/24  Rising attack levels in the cloud

04/23  Emerging cybercrime threats: Smart TV malware, payment card attacks

04/21  Malware threat vectors: Securing videoconferencing systems

04/18  Mobile malware threats and best practices for device protection

04/17  Winning customer trust is essential for e-commerce success

04/16  2013 Malware in review: Continuing threats

04/15  University data breaches: Security tips to protect campus resources

04/14  Security myths debunked: Finding fact among fiction

04/11  Security essentials: What to include in employee training

04/10  Payment security: Consumers increasingly make purchases on mobile devices

04/08  End of support: Security tips for Windows XP users

04/07  Protect financial institutions against data breaches

04/04  Creating customer buzz: Best practices for improve e-commerce websites

04/03  Study shows growing risk of malicious insider attacks

04/02  New malware threats: PoisonIvy, mobile Bitcoin mining, missing airplane scam

04/01  Ransomware news: Mistake makes decryption key accessible to victims

March, 2014


03/31  E-commerce groups find marketing gold mine in social media

03/26  Cyber Black Market tops drug trade in profits

03/25  Current malware threats: remote-controlled ATMs, malware-dispersing blogging program

03/21  Android, PC similarities make the OS vulnerable to malware

03/20  Data breaches expose personal information

03/19  2013's malware in review: Rising levels, most dangerous threats

03/19  Benefits and use cases for wearable technology

03/17  Tax day tips for information security

03/14  Risky locations to make debit card purchases

03/13  Retail sector considering ISAC formation to prevent data breaches

03/12  Lessons learned from celebrity social media hacks

03/11  Small businesses not outside the scope for cyberattacks

03/10  Prevent attacks from outdated software

03/07  New ransomware turns PCs into Bitcoin mining machines

03/06  Website security essentials: Protection measures every e-commerce site should have

03/05  Security firm discovers new top source for mobile malware

03/04  3 Strategies for establishing a successful e-commerce website

03/03  Top malware targets named: Certain countries, organizations and programs at higher risk of attack

February, 2014


02/28  Internet of Things: Growing value, increasing attack target

02/27  Bitcoin malware: Tips to protect digital currency

02/26  Bitcoin prices on the rise after exchange platform closure

02/25  BYOD success depends on threat awareness

January, 2014


01/29  Mobile health could benefit from encryption

01/28  Europe celebrates history of data protection

01/27  Small businesses a target of malware

01/26  10 years later, mobile malware more of a threat than ever

01/23  EU wants to implement fees for data breaches

01/22  Encryption a valuable tool in personal security

01/21  Malware in the new year: Browser extensions, point-of-sales, Internet of Things

01/20  Security breaches reveal increased data vulnerability

01/17  The Internet of Things can be hacked too

01/16  Twitter mandates SSL move for all apps

01/15  Javafog: New variant of Icefog malware discovered

01/15  Retail security breaches: a lesson in cyber security

01/13  Nuclear plant malware illustrates need for monitoring updates

01/08  Importance of PCI compliance

01/06  Yahoo malicious advertisements caused 27,000 infections per hour

01/03  Brief History: Malware now and then

01/02  Mobile malware, ransomware on the rise in 2014

corporate office

Thawte
The Gateway
Century Lane
Century City, 7441
Cape Town
South Africa

Postal Address:
P O Box 15986
Panorama 7500
Cape Town
South Africa

Call: +353 1 793 9141
Fax: +27 21 819 2950

Buy now! Try now!