A firm of attorneys involved in a property transaction paid R1 744 599.45 into the bank account of a hacker in response to emailed instructions. It was held that the attorneys were liable to the true client to pay this amount for failing to perform their mandate in regard to the trust money with sufficient

Barely recovering from the WannaCry ransomware attack, many across the globe now have to deal with the latest ransomware attack, NotPetya. Originally thought of to be the Petya ransomware for making money, security analysts quickly realised that the current cyber-attack was not designed to make money. It appears that NotPetya has actually just been designed

If insurers don’t want to cover cyber liability under a general liability policy they’d better check their wordings and introduce exclusions if necessary.

Whether or not cyber breaches are covered under the “personal and advertising injury” section of commercial general liability policies depends on the circumstances of each case. I discuss two cases which illustrate

One of the main concerns for South African businesses is dealing with cyber threats. While loss or harm caused by cyber incidents is not entirely new, these incidents have become more common in recent years due to the rapid advances in technology and the changes in many business models. By way of an example, machines

Commendably, South Africa’s new Cybercrimes and Cybersecurity Bill proposes that we take a bold step ahead of contemporary laws across Africa and beyond. Pertinently, clause 19(1) of the Bill proscribes the novel concept of cyberlaundering.

Cyberlaundering is the use of a computer to perform or assist an unlawful financial transaction or a relationship involving property

Cybercrime happens at the speed of broadband with criminals able to easily move the tools of their activities from one location to another. Successfully combatting cybercrime therefore requires real time detection and investigation, often by different agencies in different countries.

Cybercrime has exploded internationally in the past several years in tandem with the surge of

Each device which accesses the internet is allocated a unique number (Internet Protocol or IP address) by its internet service provider (ISP). A record is created each time this IP address accesses a webpage, including the date, time and URL (website address) accessed. These records are stored by the ISP.

ISPs are prohibited from providing

The Cybercrimes and Cybersecurity Bill expands on the original sections of the Electronic Communications and Transactions Act 2002 (ECTA). The creation of 20 new cybercrime offences illustrates the extent to which technology is being used for unlawful purposes and the need to protect yourself in your activities online.

Existing cyber crimes

There are currently only