Home » hacking » Page 2

hacking

4 Simple Steps Your Company Can Take to Protect ERP Systems from Cyber-Threats

Image sourced from Software ONE. Cybercrime taps into the vulnerability of business systems and can pose a real threat to a robust supply chain. A sophisticated ransomware attack recently targeted the world’s largest meat processor. Following the business system breach, operations in the US and Australia were disrupted, resulting in a knock-on effect. The meat processor had no option but to shut down nine beef plants in the United States and several plants in Australia. Several truck drivers who specialize in hauling livestock also had no choice but to drive hundreds of miles to pick up cattle from an alternative supplier. For the end-consumer, the long-term impact of the cyber-attack could mean inflated meat prices. Unfortunately, this is not the only instance of a cyber-attack on critica...

EA Games Struck by Massive Hack, FIFA 2021 Source Code on Dark Web

Sourced from Electronic Arts Inc. Gaming mega-publisher EA has been struck by a massive data hack. The hackers responsible have absconded with the source code for the hugely popular FIFA 21, as well as the source code for EA’s Frostbite Engine – the game-running shell and development tools behind FIFA as well as EA’s next big release Battlefield 2042. The source codes are reportedly currently being auctioned off in hacker forums on the dark web. The criminals behind the attack are only accepting offers from big-name members of the hacking community. Stolen Source Codes Source codes are the raw coding behind any application or programme. With a stolen source code and the right know-how, a user can duplicate a programme – for example, a video game – and do whatever they may wish to it. Usual...

3 Tactics Hackers Use to Steal Passwords

Passwords, a basic yet essential part of cybersecurity, are the first line of defence against cyberattacks in our increasingly digital world. However, according to research from Check Point Software, many users are under the false impression that cybercriminals have no interest in their personal information or data on their computers. And it is for this reason that the robustness and strength of passwords are more important now than ever. With that in mind – thanks to Checkpoint – here are three of the tactics used to steal passwords along with the necessary steps to prevent any person from becoming a victim of cybercrime: 1. Phishing attacks This method has become one of the most widely used tactics for stealing passwords and usernames. It works in a simple way: by sending an email that a...

There are 577 Malware Attacks in South Africa Every Hour, Research Shows

Sourced from Republic Title The 2019 KnowBe4 African Report found that the continent is increasingly vulnerable to cyber-attacks. The report highlighted how vulnerable users were when it came to recognising cyber-threats and managing their risk profiles. In 2020, Accenture released a report entitled ‘Insight into the Cyberthreat Landscape in South Africa’ that revealed that there are around 577 malware attacks every hour, many of them are unsuccessful, however. Cybercrime has turned towards Africa and is putting its people and organisations at risk. “With cybercrime shifting its attention towards emerging economies and with Africa’s internet penetration about to double to one billion internet users by 2022, the African continent has become an attractive target for cybercrime,” says Anna Co...

  • 1
  • 2