Digging for gold

Jeevan Thankappan by Jeevan Thankappan - July 15th, 2014

Intensified competition coupled with declining voice ARPU is forcing telecom service providers to look around for new revenue streams that some of the new advanced technologies offer. However, it can be a daunting task for carriers who are saddled with legacy systems and manual internal processes.

Bitcoin exchanges hit by DDoS attacks

Tim Hornyak by Tim Hornyak - February 12th, 2014

The problems plaguing Bitcoin worsened Tuesday as online attacks on the digital currency’s software affected two more exchanges.

UK’s GCHQ reportedly infiltrated and attacked hacktivist groups

James Dartnell by James Dartnell - February 6th, 2014

British intelligence agency Government Communications Headquarters (GCHQ) has reportedly infiltrated hacktivist groups and used denial-of-service and other techniques to disrupt their online activities.

Arbor Networks: 36% increase in advanced persistent threats

James Dartnell by James Dartnell - February 4th, 2014

Arbor Networks has released its 9th Annual Worldwide Infrastructure Security Report, which has found a 36 percent increase in organisations targeted by Advanced Persistent Threats.

A10 Networks unveils Thunder TPS Threat Protection System

James Dartnell by James Dartnell - January 16th, 2014

A10 Networks, has announced the A10 Thunder TPS Series, designed for protection against DDoS attacks.

Mobile internet subscribers may unknowingly pose greatest threat to Middle East telcos

Mahmoud Samy, Area Head, Middle East, Pakistan and Afghanistan, Arbor Networks by Mahmoud Samy, Area Head, Middle East, Pakistan and Afghanistan, Arbor Networks - January 7th, 2014

Telcos now face threats on their mobile network from their own subscribers and their device says Mahmoud Samy, Area Head, Middle East, Pakistan and Afghanistan, Arbor Networks

Mobile internet subscribers unknowingly pose greatest threat to Middle East telcos

Mahmoud Samy, Area Head, Middle East, Pakistan and Afghanistan, Arbor Networks by Mahmoud Samy, Area Head, Middle East, Pakistan and Afghanistan, Arbor Networks - January 6th, 2014

The Middle East and Africa region’s insatiable demand for smarter mobile devices and multimedia content delivered on-the-go is causing telecom operators to battle tremendous growth in mobile traffic on their networks.

DDoS ‘playground bully’ blackmailers jailed ‘ for attack on UK casino firm

By John E Dunn by By John E Dunn - December 22nd, 2013

Two “sinister playground bullies” have been jailed for a brazen attempt to extort a 50 percent share of a Manchester-based online casino using the threat of DDoS attacks capable of taking the business offline.

Analysis: security weak spots

Stefan Hammond by Stefan Hammond - December 17th, 2013

Reading the coverage of the recent breach of Adobe passwords, we learned that 1.9 million users used “123456″ as their password. That’s right: out of 38 million cracked passwords, almost two million adults used ones more suited to five-year-olds.

Arbor: average Middle East attack is 2.376Gbps

James Dartnell by James Dartnell - December 10th, 2013

Arbor Networks’ 2013 research of DDoS activity in the Middle East has revealed that the average size of attacks in the region is 2.376Gbps and the average duration of an attack exceeds an hour and ten minutes.

The Way Forward

James Dartnell by James Dartnell - December 4th, 2013

When it comes to security, it seems everyone’s in a state of perpetual panic. Whether it’s mobile malware, BYOD or hacktivism, over the course of 2013 the issue of protecting valuable information and resisting attack has inspired a dizzying and persistent challenge.

Wisconsin man fined $183,000 for Anonymous DDoS attack

John Ribeiro by John Ribeiro - December 3rd, 2013

A man from Wisconsin was sentenced for participating in a DDoS (distributed denial-of-service) attack by hacker group Anonymous on a Kansas company.

Insight: top signs that you’ve been breached

Barry Shteiman by Barry Shteiman - November 27th, 2013

Because data is often the most valuable corporate asset – especially when customer information is concerned – staying alert for potential compromise is a critical IT job. Unfortunately, looking into a potential data breach is not easy.

Bitcoin and Litecoin miner module included in crimeware kit

Jeremy Kirk by Jeremy Kirk - November 26th, 2013

A new malicious software programme, advertised for sale on underground forums, claims to mine and steal bitcoins, according to a Danish security company. The Atrax malware is notable for its low US$250 price …

Kaspersky investigation shows malware is on the rise

James Dartnell by James Dartnell - November 5th, 2013

Kaspersky Lab has revealed research results that show an increase in malware in the Middle East.

New York Times site outage caused by attack on domain registrar, company says

Jaikumar Vijayan by Jaikumar Vijayan - August 28th, 2013

The New York Times blamed a prolonged website outage on Tuesday on a hacking attack at the company’s Australia-based domain name registrar, Melbourne IT.

China suffers major DDoS attack on .cn domain

Michael Kan by Michael Kan - August 26th, 2013

China’s Internet on early Sunday morning suffered a major distributed denial of service (DDoS) attack that briefly disrupted and slowed access to sites in the .cn domain. The DDoS attack was the largest …

Hackers steal millions after US banks cyberattack

Jeremy Kirk by Jeremy Kirk - August 25th, 2013

At least three U.S. banks have lost millions of dollars after fraudsters gained control of payment applications that control wire transfers.

Police arrest alleged DDoS extortion gang at Heathrow Airport

John E Dunn by John E Dunn - August 12th, 2013

Two Polish men were arrested at Heathrow Airport earlier this week in connection with an alleged DDoS extortion attack on a Manchester-based business, news sources have reported. Details are light but it is …

DDoS attacks getting bigger but shorter in duration

John P. Mello by John P. Mello - August 1st, 2013

Distributed Denial of Service (DDoS) attacks are getting bigger, but their duration are getting shorter, according to an analysis released this week by Arbor Networks. During the first six months of 2013, the …

DDoS attack sizes rise above 2Gbps for first time

John E. Dunn by John E. Dunn - July 31st, 2013

Average DDoS attack sizes have climbed above the 2Gbps mark for the first time, mitigation firm Arbor Networks has reported after crunching figures from its Atlas system for the first half of 2013.

South Korea hit by disk wiping attack blamed on ‘DarkSeoul’ gang

John E. Dunn by John E. Dunn - July 2nd, 2013

South Korea has come under attack from a vicious new disk-wiping Trojan that is almost certainly part of a long-term campaign against organisations in the country, Symantec has said.

Wall Street sets example for testing security defences

Antone Gonsalves by Antone Gonsalves - June 19th, 2013

Wall Street plans to hold a simulated cyber-attack against equity markets this month that experts hope will set an example of how industries should test their defences against assailants.

Bank of England ranks cyber-attacks above Eurozone crisis as biggest threat

Matthew Finnegan by Matthew Finnegan - June 17th, 2013

Cyber-attacks have risen to the top of the list of threats for UK banks according to the Bank of England’s director of financial stability, Andrew Haldane, but understanding and management of the risk is still at an “early stage”.

Largest ever DDoS attack directed at financial firm, Prolexic reports

John E. Dunn by John E. Dunn - June 3rd, 2013

DDoS attackers attempted to bring down an unnamed financial services firm earlier this week using one of the largest traffic bombardments ever recorded, mitigation firm Prolexic has reported. The 167 Gbps peak attack …

Dutch bill seeks to give law enforcement hacking powers

Loek Essers by Loek Essers - May 3rd, 2013

The Dutch government on Thursday presented a draft bill that aims to give law enforcement the power to hack into computer systems — including those located in foreign countries — to do research, …

Ageing networking protocols abused in DDoS attacks

Jeremy Kirk by Jeremy Kirk - May 2nd, 2013

Ageing networking protocols still employed by nearly every Internet-connected device are being abused by hackers to conduct distributed denial-of-service (DDoS) attacks. Security vendor Prolexic found that attackers are increasingly using the protocols for …

Hackers increasingly target shared Web hosting servers for phishing

Lucian Constantin by Lucian Constantin - April 29th, 2013

Cyber criminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large phishing campaigns, according to a report from the Anti-Phishing Working Group (APWG). Forty-seven …

Spanish police say DDoS suspect used a van as a mobile office

Jeremy Kirk by Jeremy Kirk - April 29th, 2013

The man suspected of participating in a large DDoS attack on an anti-spam organisation that caused intermittent Internet hiccups drove around Spain in a van he used as a mobile office, Spain’s Interior …

Facebook used as billboard for malware

Antone Gonsalves by Antone Gonsalves - April 28th, 2013

A cybercriminal has taken to selling his malware and related services on Facebook, boldly choosing a public forum to reach potential customers over the secretive world of the online underground. RSA researchers recently discovered on …

Dutchman arrested in connection with large DDoS attack on Spamhaus

Lucian Constantin by Lucian Constantin - April 28th, 2013

A 35-year-old Dutchman was arrested Thursday in Spain, as part of an investigation into a large-scale DDoS (distributed denial-of-service) attack that targeted a spam-fighting organisation called the Spamhaus Project in March. The suspect …

Anonymous performs DDoS attack on Formula 1

Ben Rossi by Ben Rossi - April 22nd, 2013

Hacker group Anonymous on Saturday made the Formula One its latest victim when it performed a DDoS (distributed denial of service) attack on its official website (formula1.com), as well as defacing its fan …

Washington, Seoul collaborate on cyber protection

IDG Reporter by IDG Reporter - April 4th, 2013

Recent massive cyber attacks that paralysed computer networks at several South Korean banks and broadcasters, strongly suspected to have been launched by North Korean hackers, have prompted Washington and Seoul to come up …

Simplifying security

IDG Reporter by IDG Reporter - April 3rd, 2013

Conventional wisdom says that simple security is an oxymoron. Good security is complex, while uncomplicated security is weak. Whenever security is discussed, we think of Bruce Schneier. The US-based security guru describes crime and …

Bitcoin exchange hit with DDoS attack

IDG Reporter by IDG Reporter - April 1st, 2013

Bitcoin exchange Mt. Gox faced a distributed denial-of-service attack late Thursday, at a time the digital currency is seeing an upward swing. The Japanese company, which is rated as the largest exchange for …

Massive DDoS overhyped by media, says website watcher

IDG Reporter by IDG Reporter - March 31st, 2013

Much of the news reporting about the massive denial-of-service attack against anti-spam service Spamhaus over the past week or so went way too far in describing it as creating a slowdown on the …

Researchers find another piece of POS malware

IDG Reporter by IDG Reporter - March 31st, 2013

A new piece of malware that infects point-of-sale (POS) systems has already been used to compromise thousands of payment cards belonging to customers of U.S. banks, according to researchers from Group-IB, a security …

Mega DDoS attacks on the rise – Kaspersky

Tom Paye by Tom Paye - March 28th, 2013

DDoS attacks like the one that resulted from an altercation between a Dutch company and Spamhaus this week are on the rise, according to a statement from Kaspersky Labs. The security vendor was …

Traditional firewalls ‘no way near up to the mark’

IDG Reporter by IDG Reporter - March 26th, 2013

Are traditional firewalls sufficient to protect against today’s sophisticated attacks? According to F5 Networks Australia and New Zealand channel manager, Chris Zamagias, the answer is a distinct no.  “Attacks have become a lot more sophisticated …

Announcements

CNME Staff by CNME Staff - March 12th, 2013

Visit EMC Isilon at CABSAT 2013 March 12th – 14th at the Dubai World Trade Center Hall 7, Stand E7-32 Broadcast and production storage infrastructure plays a critical role in the ability to manage, store …

Eye of the storm

Joe Lipscombe by Joe Lipscombe - March 5th, 2013

Experts recently pointed towards security as the main obstacle for adoption of all cloud types and claimed that cloud security will be the main disruptive technology for 2013. But the Middle East has …

HP outlines Big Data Security strategy

IDG Reporter by IDG Reporter - February 26th, 2013

HP on Monday unveiled its Big Data Security strategy, describing how combining the enterprise search and knowledge management resources from its Autonomy subsidiary with its ArcSight security-event and information management (SIEM) can yield new ways to …

Gartner: Application-based DDoS attacks on the rise

IDG Reporter by IDG Reporter - February 26th, 2013

According to a new report from Gartner, hackers are adapting distributed denial of service (DDoS) attacks and combining these with social engineering tactics to try and infiltrate banks. The report, called Arming Financial …

Rising cyber threats set backdrop for latest cyber security bill

IDG Reporter by IDG Reporter - January 28th, 2013

As the Senate prepares to take another stab at passing a comprehensive cyber security bill, a new report shows the number of cyber attacks growing dramatically from China. China has accounted for the …

DDoS bank attacks signal new era of cyber warfare

IDG Reporter by IDG Reporter - January 14th, 2013

Cyber attacks on U.S. banks over the last several months reflect a frightening new era in cyber warfare, according to security expert Darren Hayes, who says that corporations are unprepared to battle such …

  • Review: Samsung Galaxy Note 3

    They say that good things come in small packages—diamond rings, the crown jewels, keys to an exotic villa. When it comes to the Samsung Galaxy Note 3, big is beautiful, writes James Dartnell.

  • Acer takes on the Nexus 7 with 7.9″ Intel tablet

    The new A1-830 tablet ticks all of the right boxes for people interested in a functional tablet sporting the sub 8-inch form factor. The tablet sports a 7.9-in, 1024×768 resolution screen at a 4:3 screen ratio; ideal for web browsing and reading e-books.

  • Battle of the fives: Samsung Galaxy S5 vs. Apple iPhone 5S vs. Google Nexus 5

    Samsung officially unveiled the Galaxy S5 on Monday at a Mobile World Congress presentation in Barcelona, touting a slimmed-down approach to the latest flagship’s feature set and simplified design.

Copyright 2014 Computer News Middle East. All rights reserved. Product of CPI Media Group. For more information e-mail us at webmaster@cpimediagroup.com. Privacy Policy