Increase in hacking activity: South Africa under cyber attack

South African companies should immediately patch and update their websites, from Joomla to WordPress and ensure that proper password policies, login policies, failed logins and other flows are properly defined and handled. In various International conflicts that are raging at the moment, South African company websites, blogs and Internet services are under attack. As the various religious, political and other conflicts on the Internet heats up, the various groups, armies and organizations are desperately seeking to increase their resources. Even those with TB capacities are…

Read More »

What you need to know about FIDO

FIDO solves one major problem but it presents one major problem as well. Are you tired of having 100 user names and 100’s of passwords? Well, FIDO provides a standard protocol for allowing external devices, such as USB sticks or Fingerprint Apps, etc. to unlock the correct encryption key for the site or app requiring you to log in. Effectively this means that you can just use a USB stick or your thumb print, or a four digit PIN, etc. to log into website services…

Read More »


UK Police Website hacked

{{unknown}}The Nottinghamshire Police website was hacked a few days ago by Anonymous hacker group AnonGhost. This attack again highlights the need for Governments all over the world to increase their vigilance on their cyber security defences. The group are pro-Palestine and released a video a few months ago in which they called for elite hacker groups to join their cause and wage cyber war against the state of Israel.

Read More »

cyber crime

Google: South Africa is a Cyber Crime HQ

According to a brand new Google study, South Africa is one of the top five countries in the world where cyber criminal attacks originate from. Almost 10%  of all cyber hijackings in the world, originates from South Africa! The Google study has found: “we found that most of the hijackers appear to originate from five main countries: China, Ivory Coast, Malaysia, Nigeria, and South Africa” The study also clarifies it’s scope: ” While significant research attention has focused on wide-spread automated hijacking facilitated via botnets,…

Read More »

flying car

Flying Car

Add to bucket list: 1x Flying Car Price: +- R2.5m Top Speed: 200 km/h Range: 700 km Fuel Consumption: 15 l/h in air & 8 liters per 100km on road Take off speed: 130 km/h Read more / Order a flying car: Available in a wide selection of colors…

Read More »

Social Media

Only losers and small children post what they are eating, where they are and what they are doing every five seconds. Only losers and stalkers care whether you are at the mall, whether you are trying on a new pair of shoes or eating a taco. Social media has granted the common person the ability to think that other people care what they are doing and what they are thinking. Yet, feeds are controlled by software and what who sees when depends on data and…

Read More »

Deep Mind and AI

News of Google expanding the Deep Mind acquisition  to add various thought leaders in the field of artificial intelligence, is interesting.  With Elon Musk spreading the word that the machine is more dangerous than nuclear weapons, interest in AI has peaked of late. Google needs Deep Mind to succeed as it believes that it will assure dominance in the search market. The coming of the machine is already inevitable. Not to support the dominance and control of a multinational market share, but to populate and…

Read More »


Google launches INBOX

In an effort to create additional vendor lock in (into your Gmail email account) Google launched  something called “Inbox” which is exactly the same as an e-mail client yet they confusingly claim that it is not that. It will get you to spend your time and efforts to train the email client “in the cloud” and not on your local software, and it will lock your settings and teachings into the Gmail system. You will find it very hard to migrate elsewhere if you start…

Read More »


SNAIL Attack

In 2014 you may have heard about *Poodle?  *Shell? *Heartbeat? but have you heard about Snail? The Snail DOS or Snail denial of service attack is a different type of slime altogether… People of South Africa are currently not vulnerable to this denial of service attack. (South Africa does not have a functioning postal service) Attack Vectors: Websites that accept updated postal information upon account creation and activation.  (South African Example: Certain traffic fine websites, toll roads, etc. ) These websites then generate printed documentation…

Read More »


Are you vulnerable to a Poodle Bite?

To test if you are vulnerable to POODLE – If you see a Poodle, you are and if you see a terrier, you are good to go Test if vulnerable to Poodle Security exploit If you are using Firefox and you do not want to wait for the 20th of November update in which SSL v3 is disabled, you can download this ssl-version control plugin from Mozilla This will stop the POODLE attack in its tracks If you are using some other browser, like Internet…

Read More »