Attacks targeting an unpatched vulnerability in the latest versions of Java 7 have become widespread after an exploit for the …
Tricks in your pocket
IT security threats are constantly evolving. It’s time for IT security pros to get ingenious. In that vein, we offer …
IT's 9 biggest security threats
Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain …
Sites seized for pirated Android apps
The United States Department of Justice (DOJ) has seized three websites for alleged copyright violations. The sites are accused of illegally distributing …
McAfee expands mobile security software package for Android
McAfee is expanding its mobile security software for Android tablets and smartphones, as it sees an increase in threats targeting …
Saudi Aramco confirms serious hacking
A hacker group calling itself the Arab Youth Group has claimed responsibility for a serious hacking attack on Saudi …
Scientists develop algorithm to target spam attacks
Scientists in Switzerland have developed an algorithm that can be used to locate spammers as well as the source of …
'Gauss' cyberweapon targets Middle Eastern banks
An apparently state-sponsored cyberweapon dubbed ‘Guass’ has been unveiled which is targeting banks and individuals in a number of Middle …
BYOD doesn’t have to be a headache
The BYOD trend is fast gaining in the traction in the Middle East. Ramzi Itani, channel and alliance director – MENA believes this trend is making VARs sit up and take notice in order to effectively secure multiple devices across their own organisations as well as those of their customers.
Google unveils stronger Flash sandbox in Chrome
Google has announced it has completed work on a stronger Flash sandbox in the Windows version of Chrome, and …
Iran to act on cyberattacks with secure intranet
Iran is pressing ahead with its promise to establish a “national information network” that could unhitch some of the …
Small businesses increasingly at risk from hackers
Attacks aimed at small businesses doubled in the first half of 2012 suggesting that hackers are dedicating more resources to …
Mobile apps are new cyber crime attack vector: RSA
Mobile apps have emerged as a new cyber crime attack vector for phishing and malware, says RSA, the security division …
IBM attempts to redefine the IPS
IBM yesterday introduced what it’s calling a “next generation” intrusion-prevention system (IPS), an offering that not only is designed to …
A productivity problem of Olympic proportions
As athletes from 205 nations participate in over 300 events during the Olympic Games in London, die-hard fans will be …
The good, bad and ugly
Vendors and law enforcement agencies are cracking down on counterfeit and grey market operations, yet these operations continue to witness explosive growth across developing nations.
Windows 8 for the enterprise
Even though Windows 8 won’t be officially released until October 26, its Metro user interface and Microsoft’s decision to remove …
Comguard achieves top level certification by Kaspersky Lab
Comguard, a Dubai based value added distributor for IT security products and the authorised training partner for Kaspersky Lab in …
3 steps to dodge the DDoS bullet
It is an all-too-common headline: Prominent website brought down by attackers. The backstory to this growing threat to business is a distributed denial-of-service (DDoS).
Kaspersky Lab and Seculert discover new cyber espionage campaign targeting the Middle East
Kaspersky Lab researchers today announced the results of a joint-investigation with Seculert, an advanced threat detection company, regarding “Madi,” an …