With the major developers of banking malware laying low, a new crook on the block has emerged gunning to be top dog in the market.


With the major developers of banking malware laying low, a new crook on the block has emerged gunning to be top dog in the market.

The impact of hacked SIM cards, one of the few stalwarts in the high-tech industry that has not seen a serious exploit, could be monumental.
Polycom has unveiled the industry’s first 360-degree, panoramic 1080p HD video collaboration solutions custom-built for Microsoft Lync.

Tom Quirke, VP and General Manger of Motorola Solutions’ Global TETRA Organisation, tells CNME that the worldwide leader in TETRA technologies has set its sights on the Middle East.
Given the record number of attendees at this year’s Reseller Middle East Partner Excellence Conference, it was clear that the region’s channel players wanted to hear how to tackle new challenges.

SAP co-CEO Jim Hagemann Snabe will leave his post in May 2014 to become a member of the enterprise software vendor’s supervisory board, leaving Bill McDermott as sole CEO.

A new report from the SANS Institute and RSA on help desk security and privacy finds help desk workers are the easiest victims for a determined social engineering criminal.

Last month, a former CIA technician leaked information on the National Security Agency’s data gathering surveillance programme dubbed PRISM. Joe Lipscombe investigates what relevance this holds for the Middle East.

Microsoft chief executive Steve Ballmer has re-organised Microsoft, as expected, eliminating the ‘silos’ of product groups and giving responsibility to key executives in charge of key technologies.
A number of factors are increasing demand for improved access control; new technology capabilities, escalating security threats, and the trend to converged access control solutions that combine multiple applications either on smartcards or a new generation of Near Field Communications (NFC) – enabled mobile phones.

Security experts offer five tips for enhancing security that don’t cost a lot of cash – and sometimes no money at all – so companies can spend their security dollars on the hard stuff.

A noisy malware campaign against South Korea is revealing deeper secrets.

South Korea has come under attack from a vicious new disk-wiping Trojan that is almost certainly part of a long-term campaign against organisations in the country, Symantec has said.

Right before bedtime, bright lights are the enemy, inhibiting the production of melatonin, which helps you fall (and stay) asleep.

Software AG-acquired Terracotta is making big moves in Big Data; its in-memory tools have seen 2.5 million deployments. Chief evangelist Gagan Mehar talks to CNME about the hype surrounding Big Data and the company’s love/hate relationship with SAP’s in-memory technology, HANA.

Facebook’s coffee-stained paper invitation to a Thursday announcement in Menlo Park promised a new product, which by all accounts …

SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to security researchers.

The things that cyber-criminals are able to do with your phone are terrifying.

With approximately 80,000 people tuning in digitally around the world, SAP’s board of executives preached to a near 100,000 strong crowd in Florida — and the message could not have been clearer; it believes HANA is the future of business.

Forrester founder and CEO George Colony has touted the shift from IT to business technology and urged CIOs to get …