FireEye has uncovered an iOS vulnerability that an attacker could use to run a monitoring app on Apple devices and record all touches on their screens.


FireEye has uncovered an iOS vulnerability that an attacker could use to run a monitoring app on Apple devices and record all touches on their screens.

Trading on major Bitcoin exchange Mt. Gox came to a halt on Tuesday and its website was only loading a blank page.

The acquisition extends HID Global’s authentication portfolio while positioning the company to deliver a variety of new secure identity solutions.

Palo Alto Networks has announced its new firewall, the PA-7050, which contains full application enablement, IPS and AV.

What do Middle East governments need when it comes to security, and are newly formed government entities set to revolutionise the way that states think about security?

Huawei is reportedly being investigated by the Indian Government over alleged ‘hacking’ of equipment belonging to state-run telecoms firm Bharat Sanchar Nigam Ltd (BSNL).

British intelligence agency Government Communications Headquarters (GCHQ) has reportedly infiltrated hacktivist groups and used denial-of-service and other techniques to disrupt their online activities.

Recently, we have been called in to help companies handle attacks from the Syrian Electronic Army (SEA). Our first priority is to help contain the damage, figure out which accounts have been compromised that have not been used yet to cause damage, and clean things up.

Windows XP’s disappearance and Windows 8’s march toward some form of success were both put on hold in January, Web analytics firm Net Applications said Saturday.

2014 marks the 10th anniversary of Cabir, the world’s first mobile phone malware. To mark this occasion, Fortinet’s FortiGuard Labs is taking a stroll down memory lane to examine the evolution and significance of mobile threats during the last 10 years.

Once upon a time within Dell, managers who needed a business analysis report had to put in an IT request, a drawn out process that drove business units to set up their own shadow IT systems to run these numbers instead.

The creator of the SpyEye Trojan used to attack millions of online bank accounts has pleaded guilty to conspiracy charges in an Atlanta court.

A KPMG study reveals that less than ten percent of businesses believe they are in a position to make use of the information they have on customer preferences, behaviour and demands.

With security so high on the agenda, businesses are doing everything they can to safeguard their networks from cyber-criminals keen to capitalise on software exploits. But do businesses pay enough attention to software updates when there are hundreds of other issues to address?

Changes in Google Chrome extension ownership can expose thousands of users to aggressive advertising and possibly other threats, two extension developers have recently discovered.

With Windows 8 bearing a good share of the blame for the declining PC market, HP is falling back on Windows 7 for its latest marketing push.

Seventy percent of CIOs plan to change their relationships with technology providers and outsourcing partners over the next two to three years, according to a Gartner survey.

The world is still in the foothills of the cyberwar era but already online confrontation is being defined by an unstable and possibly dangerous mixture of proxy conflicts and old-fashioned espionage, mixed with lower-level digital activism, security firm FireEye has said.

Digitalisation – the third era of enterprise IT – has begun, but most CIOs do not feel prepared for this next era, according to a global survey of CIOs by Gartner.

Palo Alto Networks has announced enhancements to its enterprise security platform WildFire.
GET TAHAWULTECH.COM IN YOUR INBOX