The cyberspace conflict in the Middle East – particularly Syria – is intensifying as sides exploit malware in a bid to gain advantages, according to Kaspersky Lab’s latest threat research.


The cyberspace conflict in the Middle East – particularly Syria – is intensifying as sides exploit malware in a bid to gain advantages, according to Kaspersky Lab’s latest threat research.

Palo Alto Networks has revealed that cyber criminals in Nigeria have evolved common malware campaigns to infiltrate businesses that have …

Bit9 has merged with Carbon Black, a next-generation security company to prevent and detect advanced threats on endpoints and servers andprovide immediate incident response. The combined entity, retaining the Bit9 name, has raised $38.25 million to fuel its explosive growth as businesses race to protect themselves against the ever-increasing damage from advanced attacks.

China’s state-controlled press is accusing Cisco of helping the U.S. government in cyberespionage, following its governments claims that it would create a “vetting system” for major IT products.
Network security appliance provider Cyberoam has announced the appointment of Bulwark, Emitac Qatar and Sevengate as its distributors for its product NetGenie VDSL2/ADSL2+ Wi-Fi appliances.

The world is still in the foothills of the cyberwar era but already online confrontation is being defined by an unstable and possibly dangerous mixture of proxy conflicts and old-fashioned espionage, mixed with lower-level digital activism, security firm FireEye has said.

Anthony Perridge, EMEA Channel Director, Sourcefire asks: Is it realistic to expect you can gain control over threats and outbreaks?

Cybercriminals are using third-party app sites to peddle reverse-engineered or ‘pirate’ versions of almost all the most popular paid apps available on the Google Play and Apple App Stores, software firm Arxan has discovered.

Threats lurk within networks, endpoints or devices, often hidden in poorly configured settings or permissions, ineffective data governance, access management and usage policies. These unseen threats come from all perimeters of the organisation and major trends such as BYOD, big data, cloud, and mobile apps have increased the challenge faced by IT leaders.

On any given day cybercriminals and nation states are in possession of as many as 100 zero-day software exploits known only to them, NSS Labs has calculated using the commercial vulnerability market as a baseline.

Balancing security priorities with business flexibility and agility is a tough challenge, says Anthony Perridge, EMEA Channel Director, Sourcefire.

Attackers are exploiting a new and unpatched vulnerability in Windows XP and Windows Server 2003 that allows them to execute code with higher privileges than they have access to.

The creators of a Web-based attack tool called Angler Exploit Kit have added an exploit for a known vulnerability in …

Oil giant BP is currently having a “big internal debate” about how it can lock down personal computers without losing out on flexibility for employees, as a direct result of the increasing threat of cyber attacks.

Spear phishing is one of the most effective ways to break into a corporate network – and recent studies show that employees can be easily tricked on social media to provide the information needed to launch attacks.

The biggest cyber-threats facing Middle Eastern businesses today come in the form of targeted attacks, Trend Micro’s Vice President for the Mediterranean, Middle East and Africa regions said today.

United Kingdom defence secretary Philip Hammond has announced that the government is creating a new Joint Cyber Reserve (JCR) made up of computer experts who will work alongside regular forces to protect the nation’s cyber defences.

Two Middle East ethical hackers from Help AG, a regional information security consulting company, have qualified to participate in the World Finals of the Global CyberLympics, an EC-Council Foundation initiative supported by the United Nation’s International Telecommunications Union (ITU).

A group of between 50 and 100 professional hackers operating out of China has been systematically targeting businesses, military and government agencies around the world since at least 2009, security vendor Symantec said in a report released on Tuesday.

The US is engaged in a wide-ranging campaign of cyber-operations against foreign targets, launching over 200 in 2011 alone, budget …