Users of old Windows systems can now download a patch to protect them from this week’s massive ransomware attack. In …
Significant drop in Necurs botnet mailings
According to Kaspersky Lab’s “Spam and phishing in Q1 2017” report, the world’s largest spam botnet, Necurs, demonstrated a relative …
GISEC 2017 to showcase latest security technologies
As companies and individuals across the globe increasingly feel the pressure to protect crucial information online, cybersecurity firms at the …
Ingram Micro to present cybersecurity services at GISEC
Aptec, an Ingram Micro company, has announced its inaugural participation at the upcoming 2017 Gulf Information Security Expo and Conference …
Cybersecurity confidence rise among UAE users
The Index for the second half of 2016 demonstrated a positive trend: the number of people who are concerned about their security, and are ready to protect themselves against cyber threats, is constantly growing.
Financial firms suffer million dollar losses per cyberattack
The costs associated with cyberattacks on the financial sector are rising as organizations face increasingly sophisticated threats. New research by Kaspersky …
Ransomware: Pay it or fight it?
How to survive a ransomware attack unscathed
SCOPE Middle East joins HID Advantage Partner Program
SCOPE Middle East has announced that it is now a member of the HID Advantage Partner Program, a loyalty-based programme which advances a partner’s relationship with HID Global.
Best practices to prevent DDoS attacks
DDoS attacks are vastly bigger now. Here is what you need to do to protect yourself and your network.
Device advice
Mobile is the new endpoint in IT. Getting the job done using mobile devices as you move around has brought in its wake many benefits and improved productivity to organisations in the Middle East. Here is how to protect mobile devices and data.
Under siege
There has been a dramatic increase in cyberattacks on critical infrastructure but regional organisations remain unprepared.
Future perfect
John McCarthy, who coined the term, defined Artificial Intelligence as ‘the science and engineering of making intelligent machines.’ Recently, intelligent machines – their creators, specifically – have taken leaps and bounds when it comes to meeting humans as equals in terms of processing power and the ability to make informed decisions.
Three’s the magic number
Westcon-Comstor is flaunting a range of its security services in its third outing at GISEC. Chief among them are its logistics, cloud and flexible finance solutions.
Inside job
These days, the threat landscape for most companies is massive. But while there is a litany of outside threats that their security teams need to worry about, there is often an even greater danger much closer to home.
The six pillars of next-gen endpoint protection
Advancements in attack evasion techniques are making new threats extremely difficult to detect. To keep up, a new security model that uses a different approach to the traditional “evidence of compromise” process is needed.
Software AG appoints new Alliance and Channel Director
Software AG has announced the appointment of Ghassan Darri as Alliance and Channel Director for the Middle East and Turkey to further accelerate the adoption of its Digital Business Platform and bolster its growth initiatives.
Hacking Team zero-day used in new Darkhotel attacks
According to recent reports, files and tools owned by the Hacking Team that has been leaked previously has now been repurposed by a cyber-espionage group targeting luxury hotels.
Symantec uncovers Morpho hacking activities
A cyber espionage group has targeted high-profile technology, Internet, commodities and pharmaceutical companies in the US, Europe and Canada, reports Symantec.
Bad behaviour
Companies can spend untold funds on the latest security software, keep their firewalls and security infrastructure up-to-date, monitor networks, and employ the highest level of IT talent all in the name of security. However, it can all be rendered useless by one simple thing – employees choosing to ignore basic regulations.
Faster Internet access means more cyberattacks for Africa
The rapid development of Internet access throughout Africa has not been accompanied by an equivalent increase in awareness of security …