The small microchips known as “subscriber identity modules” or Sim cards that are required for mobile phones to log on to a phone network will soon be 25 years old. While mobile phones and network technology have progressed in leaps and bounds, Sim cards are still
Browsing: In-depth
Is it true spies hack technology companies? Can governments really listen to your phone calls? Should we care? The latest details of NSA and GCHQ intelligence agency activities to come from files leaked by Edward Snowden are of the apparently massive theft of mobile
A competitor with a sharp edge. That appears to be the conclusion if the R7bn tie-up between Vodacom and Neotel goes ahead. While this will be good for investors in Vodacom, it might also be positive for the man
Third mobile operator Cell C is making significant inroads against its bigger rivals, growing its subscriber base by 44% in the 2014 financial year, numbers disclosed by the mobile operator on Tuesday show. It has also
Cell C and Telkom have emerged as the winners in new research into which of South Africa’s operators offer the best contract plans for four pre-defined and distinct customer types. Tariffic, which
Eye tracking devices sound a lot more like expensive pieces of scientific research equipment than joysticks — yet if the…
Shortly after 9/11, the South African government introduced measures to fight terrorism in the country, including a bill allowing the monitoring and interception of communications. It became the
Wi-Fi networks, rather than those operated by mobile communications companies, will eventually be the predominant way that South Africans connect to the Internet, according to Alan Knott-Craig, the
President Jacob Zuma and national assembly speaker Baleka Mbete knew about the security plan ahead of last week’s infamous state of the nation address (Sona) in parliament. They were briefed about protective measures put in place. These measures saw disguised
The Hypertext Transfer Protocol, or HTTP, is a key component of the World Wide Web. It is the communications layer through which Web browsers request Web pages from Web servers and with which Web servers respond with the contents of the page. Like much of