All ARTICLES

ALL ARTICLES

Why you need to replace your legacy systems

Legacy systems pose real challenges to small business, often because they’ve outlived their usefulness and no longer provide a worthwhile return on investment (ROI). Hence, they’re best upgraded or replaced.

How 5G technology could shape Africa`s future

The impact of mobile technology is likely to be even more profound in the future, with 5G â€` or the fifth generation of mobile communications technologies â€` expected to have an even greater societal levelling effect than its predecessors, says Dej ...

World Password Day: The dos and don`ts of passwords

6 May is observed internationally as World Password Day. This day is seen as an opportunity to promote better password habits while highlighting the critical need for improved cybersecurity. World Password Day originates from the security researcher ...

Ukheshe Technologies develops SA`s first WhatsApp payment gateway

Ukheshe Technologies and Infobip have recently developed South Africa`s very first WhatsApp payment gateway for use by Telkom. In addition to being South Africa’s first digital wallet platform, the solution is also the first WhatsApp channel to ...

Microsoft: Remote work is exhausting and we need to take action now

The first annual Microsoft Work Trend Index should be a wake-up call for bosses and software developers alike to improve employee experiences as offices reopen.

The 8 most in-demand IT jobs in South Africa right now

Xpatweb has released its 2020/21 Critical Skills Survey Report, which details the eight most sought-after jobs in the IT sector right now. The survey is conducted annually across a wide range of multi-national and corporate companies in South Africa ...

Hackers Steal $600 Million in Likely Largest DeFi Crypto Theft

The Tether logo is seen on a smartphone in this arranged photograph taken in Washington, D.C., U.S., on Tuesday, Dec. 5, 2017. Tether, which started trading in 2015, is described as a stable alternative to bitcoin`s wild price swings.

A basic guide to diving in to the dark web

A frank guide to the Internet`s unindexed underbelly -- the deep and dark Internet.

What is cyberwar?

Everything you need to know about the frightening future of digital conflict

What is cyberwar? - What is -- and what is not -- cyberwarfare?

Whether an attack should be considered as an act of cyberwarfare depends on a number of factors. These include the identity of the attacker, what they are doing, how they do it -- and how much damage they inflict.

.Which countries are preparing for cyberwar?

Pretty much every single nation with the money and the skills is investing in cyberwarfare and cyberdefence capabilities. According to US intelligence chiefs, more than 30 countries are developing offensive cyber attack capabilities, although most of ...

Cyberwar and the future of cybersecurity

This special report from ZDNet and TechRepublic takes an in-depth look at today`s security threats and provides advice to defend against attacks.

Cyberwar and the Internet of Things

Big industrial control systems or military networks are often considered the main targets in cyberwarfare but one consequence of the rise of the Internet of Things may be to bring the battlefield into our homes.

The growing power of location intelligence

Apart from logistics, there are myriad use cases for almost every other industry, so if you are not using location intelligence, are you even relevant?

In the City of Cape Town? Here`s an alternative to standing in queues for vehicle licences

•*The licence grace period has been extended.* •*Vehicle, learners` and driving licences which expired between 26 March 2020 and 28 February 2021 will be valid until 31 August.* •*Third party services could renew your vehicle licence on your ...