Amjad Fathi Al-Omar, General Manager, Sariya IT, reveals growth strategy and channel plans for the year.
‘Incredibly advanced’ hackers hit ME infrastructure
A cyber-espionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.
Cyber subversives
Debating political issues, promoting free speech, and supporting human rights, the illegal cyber activities of hacktivists divide opinion. Are they criminals like any other, or are their cases of their work justifying their underhand means?
Lessons learned
2014 has already gone down in history as the year of the data breach. As we move into the new year, what have we learned from our past that will aid us in the futures.
iOS users ‘more security conscious’ than Android base
Data released by cloud storage service iDrive suggests that iPhone and Android users differ in terms of security and privacy habits as well as many others.
Stuxnet hit nuclear site via ‘trusted business partners’
Stuxnet, the powerful malware that wormed its way in and hobbled Iran’s uranium enrichment efforts, infiltrated the secure networks of the nuclear program via trusted partners, newly public information reveals.
Hacker headspace
With cybercrime an ever-present danger, hackers around the world attack user data for financial and political gain. But they are not all bad. CNME takes a look at the mindset of hackers good and evil, and how they constantly ask questions of governments and top companies.
A safe bet
The OS wars are nothing new. Every user has a laundry list of reasons why their operating system is king. One of the key points in determining which OS reigns supreme is security. CNME investigates the security successes and pitfalls of the most commonly used operating systems.
Malicious mobility
From paying bills on our smartphones to banking on our tablets, we are living more and more of our lives on our mobile devices. However, with all of this agility comes a measure of concern.
Virtual lock down
Virtualisation has made the data centre a more flexible and agile place. However, the trade-off in this software-defined shift is a measure of complexity when it comes to protecting our data. Enterprises must reconsider their protection strategy to reflect the new, virtualised world.
Prevention is better than cure
With security so high on the agenda, businesses are doing everything they can to safeguard their networks from cyber-criminals keen to capitalise on software exploits. But do businesses pay enough attention to software updates when there are hundreds of other issues to address?
Reseller Hot 50 honours channel icons
The stakeholders of the channel gathered together for the second edition of Reseller Hot 50 Awards, which was held at H Hotel in Dubai.
The Way Forward
When it comes to security, it seems everyone’s in a state of perpetual panic. Whether it’s mobile malware, BYOD or hacktivism, over the course of 2013 the issue of protecting valuable information and resisting attack has inspired a dizzying and persistent challenge.
Fake AdBlock Plus app removed from Google’s Play store
Google has removed an application from its Play store that purported to be AdBlock Plus, a well-known application that blocks online ads.
New Trojan could create headaches for banks, customers
With the major developers of banking malware laying low, a new crook on the block has emerged gunning to be top dog in the market.
You have 1 new hack request
If 3,370,780 UAE residents use Facebook, and 80 percent of those replicate their passwords for other accounts, then the opportunity for cyber theft and hackers to infiltrate personal accounts is extremely high.
With Carberp source code’s release, security pros expect the worst
With the previously $40,000 Carberp Trojan’s source code now freely available, experts expect exceptionally destructive variants of the malware to flow onto the Internet.
Virgin Radio hack could lead to targeted attacks on users, says researcher
Last week’s attack on the Virgin Radio Dubai website could have provided cyber-criminals with a springboard from which to launch …
Spam’s birthday and Hotmail’s closure lead email milestones
This week was a week for email milestones. Spam – that scourge of the Internet – turned 35 years old. And …
The security guide to BYOD
There’s no use in trying to resist it – BYOD is here to stay. To help in the transition, CNME …