A new report summarising the malware and cyber security trends for the second quarter of 2012 has been released. The report found …


A new report summarising the malware and cyber security trends for the second quarter of 2012 has been released. The report found …
The third quarter installment of the security specialist’s focused security event will feature presentations that address DDoS prevention, user-aware security infrastructure, IPv6, secure password management,among others.

Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain …

Saudi Aramco, Saudi Arabia’s national energy company, said it had repaired 30,000 workstations infected with a malicious virus earlier this …
A timer found in the Shamoon cyber-sabotage malware discovered last week matches the exact time and date when a hacktivist …

Attacks aimed at small businesses doubled in the first half of 2012 suggesting that hackers are dedicating more resources to …

As athletes from 205 nations participate in over 300 events during the Olympic Games in London, die-hard fans will be …

It is an all-too-common headline: Prominent website brought down by attackers. The backstory to this growing threat to business is a distributed denial-of-service (DDoS).

With the advent of the BYOD phenomenon, the amount of threats businesses face have multiplied on an unprecedented scale. Ben …

The Flame cyber-espionage malware makes use of a previously unknown cryptographic attack variant that required world-class cryptanalysis to develop, experts …

After something of a holiday hiatus at the end of last year, malware is back – according to security firm …

A new, highly sophisticated malware threat that was predominantly used in cyberespionage attacks against targets in the Middle East has …

Malware criminals are on the hunt for Mac victims again, repurposing the Java-based vulnerability used by the Flashback bot to …

Norton has initiated ‘The Mini Campaign’ which encourages channel partners and resellers in the Middle East and Africa to join …

Comguard, a Dubai based value added distributor for IT security products and solutions in the Middle East and North Africa …

The year 2012 is dominated by three key trends – cloud, virtualisation and big data. These may be revolutionising the …

Spectrami announced it has signed a distribution agreement with Microdasys to distribute a wide range of enterprise security solutions in …

RSA chairman Art Coviello gave an impassioned speech to kick off the RSA Conference 2012, sending out a stark action …

The panel discussion at the Kaspersky Lab Cyber Conference titled “Cyber Security Co-operation: Bringing Nations together” brought together a group …

IT professionals believe that assessing the potential harm caused by data breaches is more useful to mitigating the effects of …