The head of the malware analysis team at antivirus vendor Kaspersky said last week that a recently found exploit that …
Microsoft, Symantec take down botnet
Microsoft and Symantec on Wednesday announced that they have dismantled a botnet that took over millions of computers for criminal …
Review: Samsung Galaxy Note 2
Is there really any need for a touch-screen phone with a 5.5-inch display? Plenty must think so, given the sales …
‘Red October’ cyber espionage network discovered
A cyber espionage network has been allowed to flourish in Eastern Europe, former Soviet republics and Central Asian countries since …
Is Iran really behind recent stream of DDoS bank attacks?
Though U.S. officials have consistently blamed Iran for the ongoing stream of distributed denial of service attacks (DDoS) against major …
Researchers show proof-of-concept Microsoft ERP hack
Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting …
Forecast: The top 5 trends of Middle East IT
Technology has filtered down to infiltrate every part of our routine life and society at large. The Year 2012 …
Introducing iTunes 11
Make no mistake: When you first launch iTunes 11, it’s going to feel awfully different from the iTunes you’ve grown accustomed …
10 reasons why your cloud is only as good as your network
According to a recent study ‘The Five Faces of the Cloud’ by Bain & Company, revenue from sales of …
Lack of cloud protection opens door for botnet attacks, study says
Some cloud providers fail to detect and block malicious traffic originating from their networks, which provides cyber criminals with an …
Over 200 vendors at risk from critical software flaw
CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows …
HP advances software-defined networks
HP has rolled out, what it claims is, the industry’s first open-standards-based software-defined network (SDN) technologies to span infrastructure, control …
Islamic hacktivists’ bank attack claims gain credibility
The ‘denial of service’ attack that disrupted the Wells Fargo & Co. electronic banking operations was the fourth since in …
Windows Server 2012 embraces the data centre
Microsoft has taken its server OS a giant step forward with yesterday’s release of Windows Server 2012, making this version …
Future warfare could be online, experts say
Future warfare could be fought by soldiers using bullets and bombs as well as people hunched over laptops according to …
Equipping smartschools for a digital future
Dubai is no stranger to having to proactively adjust its approach to expanding technologies. With the integration of ICT in …
Gov surveillance malware monitors Middle East accounts
A sophisticated cyber surveillance tool that monitors financial transactions with Middle Eastern banks was ‘probably’ built by or …
Probox is latest 'Dropbox for the enterprise'
Storage integrator Proact has launched Probox, a new file-sharing and storage service claiming to be a “Dropbox for the …
Microsoft tool spots weaknesses in newly installed programmes
Microsoft has released a free tool to help system administrators, IT security professionals and software developers understand how newly installed …
Taming text in 9 simple steps: Pages
Far more than Apple’s “version of Word,” Pages is full of powerful, time-saving features that help you make great word …