In a security landscape report released on Tuesday, security software maker F-Secure claimed that 2012 was the “year of the …
Chinese malware targets US drones
Security firm FireEye has claimed that a series of targeted malware attacks detected a year ago are almost certainly part …
New IBM security tool can catch insider threats
IBM has rolled out a tool it says can cull massive terabytes of data, including email — to help customers …
Losing the battle
Security shot up the priority list of not just CIOs but also higher management in 2012 as the world witnessed …
Researchers find another Java security flaw
Researchers from a Poland-based vulnerability research firm on Friday announced that they had found vulnerabilities in Java 7 Update 11 …
Trojan disguised as latest Chrome update
Following Google’s recent upgrade of Chrome, a new wave of bogus updates has been set upon the Internet by cyber …
Keeping secure? Virtually impossible
The last 12 months has seen an incredible transformation from traditional IT towards a new, digitalised world which has begun …
Dexter malware infects point-of-sale systems worldwide:
Researchers from Israel-based IT security firm Seculert have uncovered a custom-made piece of malware that infected hundreds of point-of-sale (PoS) …
Researchers show proof-of-concept Microsoft ERP hack
Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting …
The moving target
The advent of mobility and its infiltration on enterprise has birthed a whole new type of security risk, and as …
BYOD puts the employee in control, says Blue Coat
With the advent of mobility and the influx of BYOD in enterprise, employers are struggling to keep control of their …
Security digital identities
In today’s digital world, the identity of users is defined by their digital credentials. The ability to demonstrate their identity, …
AccessData unveils new release of CIRT
Security vendor AccessData has launched version 2 of its CIRT (Cyber Intelligence and Response Technology) product, which is the only …
Scope ME partners up with NSFOCUS
Scope Middle East, a specialty distributor and technology solutions provider in the Middle East, has signed a distributorship agreement with …
HSBC restores websites after major DDoS assault
HSBC has restored access to several of the company’s most important websites rendered inaccessible for ten hours by what is …
Infected computers rented as proxy servers on the black market
Cyber criminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels …
Router flaw allowed DNS attack on 4.5 million DSL gateways
Details have emerged of an extraordinary attack in which millions of DSL broadband routers in Brazil were hit by a …
Islamic hacktivists’ bank attack claims gain credibility
The ‘denial of service’ attack that disrupted the Wells Fargo & Co. electronic banking operations was the fourth since in …
Shifra to showcase security portfolio at GITEX 2012
UAE-based value added distributor Shifra aims to leverage increased investments in IT security to expand in business in the region and will be showcasing its portfolio of dynamic security solutions at GITEX Technology Week 2012.
Centrify teams up with Shifra to boost presence in MENA
Centrify Corporation has signed a distribution contract with regional VAD, Shifra to promote, sell and service Centrify’s security and compliance solutions. The companies will also host their first partner technical accreditation training course in Dubai later this month and participate at GITEX Technology Week.