This paper gives a summary of the evolution of cybercrime laws in South Africa. It starts off by summarising how common law and the Electronic Communications and Transactions Act addressed cybercrime. The paper then proceeds to discuss the recently promulgated Cybercrimes Act, which is now the prim...
A threat actor with suspected ties to Russian nation-state hackers has listed thousands of IoT devices as proxy networks within minutes of their initial compromise. A campaign that began in 2020 has so far infected 20,000 IoT devices, according to a new report by Trend Micro. Article Rhysid...
A new U.S. Senate bill titled“Combatting Money Laundering in Cyber Crime Act of 2024”(S.4830) aims to give the U.S. Secret Service agency the power to investigate the following: “various crimes related to digital asset transactions and to counter transnational cyber criminal activity, inclu...
A common related trend relates to sudden activity in accounts that were previously dormant, with the final act leading to an immediate cash withdrawal or outward wire transfer. By the time such activity is detected it is often already too late, but it is important to learn from it to prevent...
Fireeye, February 19. Google Scholar Miniwatts. 2015. Internet Usage and 2015 Population in Oceania. Internet World Stats. http://www.internetworldstats.com/stats6.htm. Nakashima, Ellen. 2012. When is a Cyberattack an Act of War? Washington Post, October 26. Google Scholar Rid, Thomas....
Marshals Service have warned of prevailing telephone fraud in which callers act ... Explore More News Lloyds Bank Charged with £500K Fine for Breach of Financial Regulatory Standards Lloyds Bank corporate markets jersey received a fine of £498,000 in relation to the dealings with... ...
Law Number 19 of 2016 in the criminal act of defamation or insult decision Number 30/Pid.Sus/2020/PN Tte, and what is the purpose of the threat of imprisonment in the criminal act of mayantara or cyber crime decision Number 30/Pid.Sus/2020/PN Tte about defamation. The r...
FACT Urges Treasury to Implement Landmark Corporate Transparency Act FACT has urged the treasury department to impose crucial changes to draft regulations and impleme... Explore More News Ransomware attacks increase as more people work from home According to a study published by the cybersecurity ...
Gramm-Leach-Bliley Act (GLBA) HIPAA / HITECH COBIT Compliance PCI Standards Security Operations DDOS Protection Cloud Security Identity & Access Management Biometrics Privileged Access Management Incident / Breach Response Breach Notification Digital Forensics Network Firewalls & Network ...
U.S. Securities and Exchange Commission: New rules require prompt disclosure of significant cybersecurity incidents to shareholders.17 EU Digital Operations Resilience Act (DORA): Enforces robust risk management practices across the financial sector.18 ...