Splinternet? Russia wants to build ‘independent...
The Russian government has made indications that it will build an...
Study reveals South Africa ICT skills development...
The low number of skills in the ICT sector is not unique to South Africa but...
Hackers reusing and improving existing malware
Software developers usually reuse code wherever possible, and hackers are no...
Malware Forecast: 2017 Cyber crime trends will...
In 2017, attackers developed new ransomware delivery techniques, leading to...
CentralNic signs new contract deal to support 14...
CentralNic (AIM: CNIC) a London-based AIM-listed company which provides...
These ccTLDs are subject to most UDRP disputes
Although no ccTLD appears as frequently as .com in domain name disputes,...
WPA2 security flaw risks every Wi-Fi device to...
A security protocol at the heart of most modern Wi-Fi devices, including...
Symantec will no longer allow government source...
WASHINGTON (Reuters) – U.S.-based cyber firm Symantec (SYMC.O) is no...
Google: Encryption now mandatory for sites on 45...
Google’s campaign to make HTTPS security ubiquitous has been underscored once...
KSK Rollover Postponed due to potentially risking...
The Internet Corporation for Assigned Names and Numbers (“ICANN“)...