Skip to content
First Technology Western Cape without PT 2 (1)
  • Home
  • Our Services
  • Case Studies
  • Tech Blog
  • Contact Us
First Technology Western Cape without PT 2 (1)
  • Home
  • Our Services
  • Case Studies
  • Tech Blog
  • Contact Us

Uncategorized

Severe vulnerability exposes WordPress websites to attack

By fiadmin | September 11, 2025 | 0

A severe WordPress vulnerability which has been left a year without being patched has the potential to disrupt countless websites running…

Read More

Hairy artificial skin gives robots a sense of touch

By fiadmin | September 11, 2025 | 0

Hairy robots could be more sensitive to touch than humans. Researchers at the University of Texas at Arlington have patented a new…

Read More

New ransomware arrives with a hidden feature that hints at more sophisticated attacks to come

By fiadmin | September 11, 2025 | 0

A new form of ransomware is spreading to victims around the world and the way it’s built suggests those behind it could use it to launch…

Read More

Digital transformation lives or dies in the data centre

By fiadmin | September 11, 2025 | 0

Last time, we looked at the role of the network in campus management, and how Fabric Networking powers digital transformation by enabling…

Read More

Fabric networking: Be more responsive to your business

By fiadmin | September 11, 2025 | 0

In blog 1 of this five-part series, we saw that digital transformation requires faster, more flexible, and secure networks. In this post,…

Read More

How to protect your privacy in Windows 10

By fiadmin | September 11, 2025 | 0

There has been some concern that Windows 10 gathers too much private information from users. Whether you think Microsoft’s operating…

Read More

NotPetya malware attack: Chaos but not cyber warfare

By fiadmin | September 11, 2025 | 0

The impact of last year’s NotPetya cyber attack was felt around the world, bringing several large organisations grinding to a halt…

Read More

5 things we love about Extreme’s network fabrics

By fiadmin | September 11, 2025 | 0

Last time, we explored the evolution of networking. And back in the second post in this blog series on fabric networking, we saw how…

Read More

Phishing scam claims recall on exploding Barclays credit cards

By fiadmin | September 11, 2025 | 0

Scammers are taking phishing attack low tech in a scheme targeting Barclays customers, claiming that a recall has been issued for…

Read More

Ghostscript flaw could allow attackers to take remote control of systems – and there’s n

By fiadmin | September 11, 2025 | 0

A vulnerability in Ghostscript, a widely used interpreter for Adobe PostScript and PDF page description languages, could allow attackers…

Read More
« Newer Posts
Older Posts »

Recent Posts

  • DJI will pay $30K to the man who accidentally hacked 7,000 Romo robovacs
  • Why China’s humanoid robot industry is winning the early market
  • Google takes control of ‘Android of robotics’ project in quest for physical AI
  • Amazon blames human employees for an AI coding agent’s mistake
  • Waymo’s next-gen robotaxi is ready for passengers — and also ‘high-volume production’

Recent Comments

  1. A WordPress Commenter on Responsible AI Starts With Responsible Leadership
First Technology Western Cape without PT 2 (1)

Subscribe to Our Site

Quick Links

  • Home
  • Case Studies
  • Contact
  • Tech Blog

Contact Us

021 525 7000

First Technology Western Cape without PT 2 (1)

Quick Links

  • Home
  • Case Studies
  • Contact
  • Tech Blog

Contact Us

021 525 7000

Subscribe to Our Site

© 2026 First Technology WC. All Rights Reserved. | Designed, Hosted & Managed By First Impact (Pty) Ltd.
Privacy Policy

First Technology Western Cape without PT 2 (1)

Subscribe to Our Site

Quick Links

  • Home
  • Case Studies
  • Contact
  • Tech Blog

Contact Us

021 525 7000

First Technology Western Cape without PT 2 (1)

Quick Links

  • Home
  • Case Studies
  • Contact
  • Tech Blog

Subscribe to Our Site

© 2026 First Technology WC. All Rights Reserved. | Designed, Hosted & Managed By First Impact (Pty) Ltd.
Privacy Policy

First Technology WC
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Scroll To Top