IBM yesterday introduced what it’s calling a “next generation” intrusion-prevention system (IPS), an offering that not only is designed to …


IBM yesterday introduced what it’s calling a “next generation” intrusion-prevention system (IPS), an offering that not only is designed to …

Security researcher Jonathan Brossard created a proof-of-concept hardware backdoor called Rakshasa that replaces a computer’s BIOS (Basic Input Output System) …

Security consulting firm SecureState today released a new open source hacking tool that it claims will let security researchers and …

It is an all-too-common headline: Prominent website brought down by attackers. The backstory to this growing threat to business is a distributed denial-of-service (DDoS).

An industry consortium dedicated to assuring the security of software has issued guidelines to lower the risk that vulnerabilities that …

Just days after a former employee blasted Mozilla for its frequent updates, the company on Tuesday shipped Firefox 14, patching …

Enterprise femtocells are destined to play a larger role as mobile operators look for new ways to improve the smart …

Yahoo on Friday said it has fixed the flaw that allowed hackers to steal more than 450,000 passwords from one …

Comguard, a Dubai based value added distributor for IT security products has announced the launch of WatchGuard Technologies’ entire line …

New email-based attacks, some of which target the aerospace industry, are distributing new variants of the Sykipot information stealing malware, …

Major upgrades to networks across the Middle East last year laid a foundation of faster and more reliable connectivity with …

As competition between educational institutions heats up, schools are increasingly investing in new technology as a way to differentiate their …

The Flame cyber-espionage malware makes use of a previously unknown cryptographic attack variant that required world-class cryptanalysis to develop, experts …

The future is bright for Cambium Networks following its split from parent company Motorola Solutions, according to Graham Owen, EMEA …

A new, highly sophisticated malware threat that was predominantly used in cyberespionage attacks against targets in the Middle East has …

Internet freedom advocates are finding creative ways to get their message out to the masses. The latest unique effort comes …

A skew toward more exploits on Windows Vista can be attributed to the demise of support for the operating system’s …

Desktop-as-a-Service is an interesting way for IT execs to provide cloud-based Windows desktop sessions, as well as shared resources such as storage.

EBTIC is working to create a self-sustained ICT community in the UAE by encouraging a focus on research and innovation. …

Cloud and big data are two big trends influencing the current business landscape. However, they have yet to have been …