by Thys Els | Apr 13, 2018 | Internet Security
Keyloggers is malicious software that tracks and logs the keys entered on a keyboard without the user’s consent and knowledge. Keyloggers in real life Imagine you are in front of an ATM and the person behind you peers over your shoulder as you enter your pin number,...
by Thys Els | Apr 8, 2018 | Internet Security
Phishing (pronounced Fishing) is a term used to describe the process whereby a third party trick you into divulging sensitive information by impersonating a trustworthy entity or website such as a bank, insurance company or any institution that store private,...
by Thys Els | Mar 9, 2018 | Internet Security
…you should be. If you are reading this then you should reassess the way you look at digital security. No, it is not the service provider’s problem or your “IT guy” or even the device manufacturer’s problem. It is YOUR problem. As users of digital devices,...
by Thys Els | Apr 26, 2017 | Internet Security
Phishing is a technique used by Internet scammers to trick someone to give out personal or sensitive information like banking passwords or credit card details. Every day we hear and read about someone who fell victim to a phishing scam. The reality is, unfortunately,...
by Fritz Els | Jul 23, 2015 | Internet Security
An online retailer offer users a wide range of products, but is it safe to buy online? A number of statistics show that E-commerce in South Africa is on the rise. With the increase use of mobile devices this will most probably increase on a year to year basis....
by Fritz Els | Jul 23, 2015 | Internet Security
To discuss all the different methods of Internet Fraud is way beyond the scope of this blog. However in this article I would like to discuss one way how Internet fraudsters are using email messages to get information from you. It is important that computer users are...