Name(Required)

Cybersecurity News

Subscribe to the Digimune newsletter for cybersecurity articles, cyberthreat statistics, online security solutions news, and updates on our latest products and services.

Wish to Learn Even More?

Leading South African Insurer Gets Cybersecurity Cover from Digimune

One of South Africa’s leading insurance companies, Renasa, has partnered with cybersecurity specialist Digimune to provide its network of independent brokers and their clients with a comprehensive solution to monitor, mitigate and rectify cybersecurity risks.Servicing hundreds of independent insurance brokers, Renasa will soon be offering…

Global Card Payment Leader Partners with Digimune

Leading cloud-based cybersecurity services provider Digimune has signed a cybersecurity services partnership agreement with ViaCarte, the global leader in card and payment solution provisioning to financial institutions.The partnership, which comes into effect in December, will see a number of Digimune’s advanced enterprise, SME and personal…

Q&A With Murray von Hirschberg: Act or Be Preyed Upon

Digimune safeguards businesses, families and individuals from cyberthreats. Murray von Hirschberg, the owner of several established enterprises such as The Blue Cafe and Enmasse, can testify.After two desktops were compromised and a friend’s business was cloned on social media, he realised the seriousness of the…

Deep Web Versus Dark Web: What’s the Difference?

The internet is seemingly endless and nobody knows its exact size for sure. While it offers you the benefit of connecting with others around the world, it can also be a dangerous neighbourhood to explore unprotected. In this article, we take a look at the…

5 Signs That Your Device Is Corrupted or Infected By Malware

Slow computer? Files disappearing? Programs not working as they should? If your devices are starting to exhibit strange behaviour, it might be time to pause and inspect. Electronic devices infected with viruses or malware pose a real risk to your privacy and security. Corrupted files…

How to Protect Your Work Devices from Cyberattacks

When your staff work remotely, they’re outside the security bubble that you’ve built to shield your business from cyberattacks. What’s worse, these employees often connect to your servers on unprotected personal laptops, routers, and smartphones. Unfortunately, this kind of behaviour can undermine all your efforts…

How to Protect Your Business From Cyberattacks

Gone are the days when you could install an antivirus program and then just forget about cyberattacks. As the internet, digital media and automation have evolved – so has the cybercriminal’s toolkit for accessing, exposing and destroying your data. To protect your business, you need…

Top Three Security Tips for Online Gamers

Whether you are a recreational gamer or a competitive gamer, chances are you have invested a lot of real money into your characters. Here are a few important tips on how you can be vigilant and protect your online accounts #1: Never reveal any personal…

What is Identity Theft on the World Wide Web

This type of crime relates to obtaining another person's personal or financial information to use their identity to commit fraud, such as making unauthorised transactions or purchases. Identity theft is committed in many different ways, and its victims are typically left with damage to their…

Top Threats & Key Insights Into Cybercrime in Africa

A report published by INTERPOL gives key insights into cybercrime in Africa. The result of cross-sector collaboration helps countries in Africa to understand the most prevalent threats and formulate a coordinated regional response to cybercrime. The top threats are: Online scams Fake emails or text…

Personal Cybersecurity 101 – Focus on the Basics

The demand for personal cybersecurity due to the increase of cyber incidents leaves you feeling exposed. What can you do to protect yourself and your personal data against the dark world of cybercriminals? The good news is... quite a lot, actually! By focusing on the…

What Is Cyberbullying & How to Help Prevent It

No parent wants to learn that their child is being bullied online or off. But forewarned is forearmed, so it’s worth taking the time to dissect what exactly cyberbullying is, what forms it takes and how it relates to more traditional victimisation. With this foundation,…

What is Cybersecurity – Some Basic Concepts

Cybersecurity is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in various contexts, from business to mobile computing, and can be divided into…

TransUnion breach: Is your personal data safe?

International credit bureau TransUnion confirmed this morning that it has been the victim of a hack by a "criminal third party" and will not be paying the extortion demand that was received. Criminal hacking group N4aughtysecTU, allegedly based in Brazil, has claimed responsibility, alleging that it…

Eliminate Crypto Onboarding Delays & SIM Swap Fraud

Three ways top crypto companies leverage Prove’s technology to onboard new users in 10 seconds while mitigating SIM swap fraud and other identity fraud. Cryptocurrency fraud is at an all-time high, with the FBI recently reporting a 5x surge in SIM swap attacks and issuing a warning to…

A Love Letter to Scammers

Valentine’s Day is just around the corner, so you might be thinking about picking a little something up for the ones you love. But remember to keep an eye out; with an increase in online romances, your special someone might be a fraudster, pretending to…