• BURN MEDIA
    • Motorburn
      Because cars are gadgets
    • Gearburn
      Incisive reviews for the gadget obsessed
    • Ventureburn
      Startup news for emerging markets
    • Jobsburn
      Digital industry jobs for the anti 9 to 5!

All posts by Carey van Vlaanderen

Carey van Vlaanderen
Carey is CEO of ESET Southern Africa. ESET is a global provider of security software for enterprises and consumers and is dedicated to delivering instant, comprehensive protection against evolving computer security threats. ESET’s products rank among the world’s most advanced security solutions, proven by multiple prestigious awards.
  • How to tell if your child is being cyberbullied

    Cyberbullying is a dangerous, even life-threatening issue, especially among teenagers and the results can make a child feel sad, helpless and depressed and at times, suicidal. Many affected by cyberbullying say that it is worse than face-to-face bullying. To help parents distinguish the common teenage difficulties from the red flags of cyberbullying, we have prepared a list of symptoms that can help moms and dads recognize whether their offspring is being (cyber)bullied: Snappy answers and moods swings Frequent moods swings don’t necessarily mean that child is being bothered by his or her peers. However, if these are accompanied...

  • Top tips for online safety for families across the ages

    Parenting has changed. There is no doubt that in the digital age there are now more opportunities to create experiences that were previously impossible. However, at the same time, there is even greater and more complex risks and threats that were non-existent half a decade ago, says Carey van Vlaanderen, CEO at ESET Southern Africa. For many parents, getting used to this is not easy and one of the trickiest aspects is figuring out what to do with online safety as the years go by. What is appropriate for a toddler is not exactly relevant for a six-year...

  • 5 tips to spot a Facebook hoax

    Hoaxes are all over Facebook and with users often encouraged or forced via hijacks and hacks to share and like content, it will often seem like the hoax has been personally vouched for by your friend. Fortunately, most of the popular Facebook hoaxes are unoriginal and have been seen before in some form.  So before you click that link, here are five tips to spot a Facebook hoax. If it asks you to share first, beware Scammers know that the best way to get you to click their link is to have had another friend like or share it first. So often...

  • What you need to know about WhatsApp’s end-to-end encryption

    Users of the instant messaging service WhatsApp will now benefit from more secure conversations after the company announced it has turned on full end-to-end encryption. The Facebook-owned company announced that all messages, including texts, calls, videos, voice messages and files, will be end-to-end encrypted by default, meaning that anyone other than the sender and recipient(s) will not be able to access them – not even Whatsapp employees. WhatsApp said in a statement, “Not cybercriminals. Not hackers. Not oppressive regimes. Not even us.” The news comes after it was revealed that companies such as Google, Snapchat and Facebook are...

  • 5 things you can monitor with your parental control tool

    One of the biggest concerns parents have about the internet is the kind of websites their children are browsing and the content they may be viewing. In fact, according to an ESET survey, nine out of ten parents are worried about what their kids can access. While we might expect all parents to be worried, it’s still a pretty high percentage, which seems fitting in view of the risks that their children may face on the internet in the absence of suitable precautions. The first measure of control parents should take with their children is dialogue. Rather...

  • 2016: the security challenge

    It is a fact that cyber attacks are growing more sophisticated. Protecting a company’s information and data seems to be an arduous and complicated task, and finding trained personnel willing to combat continuing attacks gets more difficult all the time. However, the good news is that it is possible to protect individuals and businesses, and that technology, management and education, combined together, are key factors for security. Technological advances bring new possibilities for individuals and for businesses. And cybercriminals are well aware of this fact. Given that technology affects so many aspects of everyday life, insecurity could be "everywhere"....

  • Ransomware: are businesses the next target?

    In the last 18 months, ransomware has emerged as a serious tool for cybercriminals and has developed into a growing concern for security-savvy citizens and business chief information security offers (CISOs). Described by some as the virus "that blackmails you", ransomware essentially blocks access to your files, while simultaneously demanding payment in return for restoring access – an attack that can earn cybercriminals big money. A large number of ransomware variants have come and gone in years gone by, from those that encrypt your hard drive in exchange for bitcoin payments, to those which simply try and scare the user into...

  • How can parents consider the suitability of apps for kids?

    Mobile apps have become a central feature of modern life. Many moms and dads welcome this change because apps offer them many opportunities to enrich the lives of their children in all sorts of ways. However, for all the upsides, there are plenty of downsides and this is where many parents can fall short. Fully understanding the safety implications of apps, maintaining visibility of what your kids are getting up to when online and even understanding digital life can be challenging. Here are some of the key things that you should be looking out for when assessing the suitability...

  • 6 top tips for safe online shopping this festive season

    The holidays are here and this means online shopping for those Christmas gifts. This also means that cybercriminal scams are aplenty. Here are six top tips to help ensure that it is a fun and safe experience. 1. Spot those phishing emails Phishing emails are often used by cybercriminals trying to steal your money and data, and this is especially true during the holiday season. For example, a criminal may send you a phishing email with a link to a ‘deal’, only for this to direct the wold-be-shopper to a spoofed or malicious website. They may then look to...

  • Why parents must teach their children about internet security

    Parenting, as we know it, is evolving in this modern, digital age. Mothers and fathers have traditionally warned their children of the physical dangers, be they pickpockets on the street or strangers in the park. Today, however parents are facing an altogether different challenge – keeping their children safe online. Children of all ages use the internet on a daily basis, for everything from Facebook and Instagram, to shopping, gaming and streaming the latest TV shows. As a result, youngsters are just as likely to suffer from cyberbullying as bullying, or from digital fraud as a pickpocket on...

  • Forget contactless, this is how we’ll pay for things in the future

    For decades, it was cash, cards and checks, but the way we pay has evolved massively in recent years. Internet shopping brought the high street into our homes, mobile payments put power in our pockets, and contactless cards make transactions as simple as 'tap and go'. What's next? It probably comes as no surprise that we expect the smartphone will continue to replace the wallet through apps like SnapScan , but other more out-there payment methods are emerging too. Here are a few trends that could take hold in the years ahead. Biometrics We can already use our fingerprints...

  • 10 things you need to know about keeping your kids safe online

    Very few parents use parental controls on internet-enabled devices bought for their children, leaving youngsters potentially exposed to online threats. Most parents feel it is suitable for children to use the internet either somewhat supervised or totally unsupervised, and many do so without talking to their children about online safety -- even though they are aware that their children may be hiding aspects of their internet activity from them. The internet is a brilliant playground for children. It allows them to engage, explore and learn -- all positive things. However, without the right guidance from parents, children...

  • 5 ways to ensure a good relationship with your Systems Administrator

    If you’ve spent much time interacting with system administrators, you know how unlikely it would be for them to host a relationship-fixing TV show. Were they born like this, or did IT support requests just grind them into jaded powder? With a combination of endless patches, glitches, and caffeinated techno pulsing in the background, they do get edgy (and court the look of pallor). Want to mend your sysadmin relationship? On this Systems Administration appreciation day, we give you a few tips to help mend fences. 1. Own your problem Sure, they get hired to fix stuff, but they...

  • Fast facts: what is a botnet and how does it spread?

    Have you ever seen posts on social networks or emails under your name that you did not send? Is your computer running slowly or do you often find your screen filled with pop ups. All of these things could be symptoms of infections and might indicate that your computer is part of a botnet. But what is a botnet? A botnet is a network of computers infected with malware that responds to an attacker to perform any activity they want. These infected computers are also known as ‘bots’ or ‘zombies’ and their master is called the botmaster. The...

  • Phishing, exploits and botnets: how they can affect your business

    More and more often companies -- regardless of their size -- are the targets of cybercriminals. The attacks usually end with sensitive information being stolen, leaving the business in a very difficult situation. In fact, ransomware cases have multiplied over the last few months. The attackers encrypt the information they get from companies in order to demand a ransom afterwards, threatening to destroy all data if it is not paid within a specified period of time. It is necessary to distinguish between the damage caused by a computer threat and by a cyberattack. Computer threats are malware samples that try to infect...