Although business leaders and analysts within Africa’s growing ICT sector agree that a sense of hesitancy hovers over the increased adoption of cloud solutions, there is consensus that there is benefit in the application of the technology. At ITNewsAfrica’s Innovation Dinner on the topic of Real-world Cloud Adoption, hosted on Thursday 05 September in Johannesburg, experts acknowledged that issues like security, cost of investment and control over data has hampered the uptake of cloud – at the same time they urged the market to ‘try it out’. “Try it out… try it in a non-mission critical production-type environment, in those grudge purchase areas like disaster recovery, like test and development. You will soon realise that the cash injection to your budget becomes so much more compell
According to the report, mobile malware was the most significant statistical category for the second quarter, in both quantity and complexity. Not only are cybercriminals developing more malware targeting mobile platforms, they are also advancing the programmes’ capabilities and behaviours. In addition to mobile malware, cybercriminals’ focused heavily on implementing campaigns designed for illegal bitcoin mining and theft as the digital currency’s value rapidly increased during the second quarter. Q2 2013 Malware Statistics: The following data was obtained using the cloud-based Kaspersky Security Network (KSN). All statistics were compiled with the full consent of users participating in KSN. Kaspersky Lab products detected and neutralised a total of 983,051,408 threats in the
According to the results of Kaspersky Lab’s “The evolution of phishing attacks 2011-2013″ survey, the number of Internet users who faced phishing attacks over the last 12 months has grown from 19.9 million to 37.3 million, an increase of 87%. Facebook, Yahoo, Google and Amazon are among main targets of cybercriminals. The study, which was carried out in June 2013 based on data from the Kaspersky Security Network cloud service, shows that what was once a subset of spam has evolved into a rapidly growing cyberthreat in its own right. Phishing is a form of Internet fraud in which criminals create a fake copy of a popular site (an email service, an Internet banking website, a social networking site, etc.) and try to lure the users to these rogue web pages. The unsuspecting user enters
The Verizon or PRISM or Snowden affair marks a turning point in the history -- a very young history -- of the Internet and its governance within the international law landscape. With the facts as overwhelming as they are frightening, they show above all the mighty power of the United States over the Internet and its users. This issue not only concerns the information of American citizens, but also all 'foreigners' who have a Google account and other Internet industry heavyweights. We are talking about the very core of Internet governance currently under American domination. The rules in question, such as respect of personal information, net neutrality or digital public policies whether national, regional or international, are at the heart of an ongoing 15-year battle. During t...
The individual responsible for one of the most significant leaks in US political history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defence contractor Booz Allen Hamilton. Snowden has been working at the National Security Agency for the last four years as an employee of various outside contractors, including Booz Allen and Dell. More