Cisco has announced Managed Threat Defense, a set of security services for the enterprise that it is providing through two new operations centres to remotely support intrusion-detection, incident response and forensics, among other services.
Saeed Agha, General Manager, Middle East, Palo Alto Networks, discusses the importance of protecting sensitive information.
Symantec fired its second CEO in less than two years on Thursday, dismissing Steve Bennett and putting board member Michael Brown in charge while the security vendor searches for a permanent replacement.
Security researchers at ESET, in collaboration with CERT-Bund, the Swedish National Infrastructure for Computing as well as other agencies, have uncovered a widespread cybercriminal campaign that has seized control of over 25,000 Unix servers worldwide.
This growth was largely attributed to misuse of automated Content Distribution Networks (CDNs) that wrap malicious code within digitally signed installers. Vincent Weafer, Senior Vice President, McAfee Labs, said point-of-sale (POS) attacks and …
Knowing what is happening on your network is a pre-requisite for security now. A new class of network visibility solutions is emerging to help you spot trouble and address issues.
Will CIOs be forced to take a ‘mobility first’ approach to building networks and is the Middle East really ready to put mobile first?
Palo Alto Networks has announced its new firewall, the PA-7050, which contains full application enablement, IPS and AV.
What do Middle East governments need when it comes to security, and are newly formed government entities set to revolutionise the way that states think about security?
British intelligence agency Government Communications Headquarters (GCHQ) has reportedly infiltrated hacktivist groups and used denial-of-service and other techniques to disrupt their online activities.
Recently, we have been called in to help companies handle attacks from the Syrian Electronic Army (SEA). Our first priority is to help contain the damage, figure out which accounts have been compromised that have not been used yet to cause damage, and clean things up.
IDC recently predicted that CIOs will be forced to take a ‘mobility first’ approach to building networks, whereby mobility solutions and BYOD policies are integrated into infrastructures. How accurate is this prediction, and is the Middle East really ready to put mobile first?
2014 marks the 10th anniversary of Cabir, the world’s first mobile phone malware. To mark this occasion, Fortinet’s FortiGuard Labs is taking a stroll down memory lane to examine the evolution and significance of mobile threats during the last 10 years.
It is difficult to remember the revolution the iPhone caused, says Anthony Perridge, EMEA Channel Director, Sourcefire
The creator of the SpyEye Trojan used to attack millions of online bank accounts has pleaded guilty to conspiracy charges in an Atlanta court.
Cybercrime in 2013 was dominated by a core of around 50 active groups, including Russian and Chinese ‘threat actors’ whose activities are only now coming to light, a report from monitoring firm CrowdStrike has found.
A list of 16 million email addresses and passwords has fallen into the hands of botnet operators, the German Federal Office for Information Security (BSI) said Tuesday.
Changes in Google Chrome extension ownership can expose thousands of users to aggressive advertising and possibly other threats, two extension developers have recently discovered.
Microsoft confirmed on Friday that it will continue to offer its malware scrubbing program to Windows XP users for more than a year after it stops patching the operating system.
More than a third of UAE users do not feel safe making e-payments on their smartphones or tablets, according to research from Kaspersky.
Every large multinational firm investigated by Cisco for its latest Security Report showed signs of malicious traffic on their networks, the networking company has revealed.
The world is still in the foothills of the cyberwar era but already online confrontation is being defined by an unstable and possibly dangerous mixture of proxy conflicts and old-fashioned espionage, mixed with lower-level digital activism, security firm FireEye has said.
Palo Alto Networks has announced enhancements to its enterprise security platform WildFire.
Scammers have devised new ways to trick users into revealing personal information, hand over control of computers and pay for unnecessary software and tech support services, security experts warn.
Kaspersky Lab has recorded thousands of attempts to infect computers used for online banking with a malicious program that its creators claim can attack “any bank in any country”.
A deeper look by Cisco Systems into the cyberattack that infected Yahoo users with malware appears to show a link between the attack and a suspicious affiliate traffic-pushing scheme with roots in Ukraine.
The world’s largest networking vendors have hit back at claims their products have been compromised by the National Security Agency after being named in an NSA spying toolkit.
CNME talks to the InfoWatch CEO
The need for advanced security is heightened further as we witness the transition to the third platform of computing, says Art Coviello, Executive Vice President EMC, Executive Chairman RSA, The Security Division of EMC.
Kaspersky Lab experts have discovered that PC gamers around the globe were hit by 11.7 million attacks in 2013.
Telcos now face threats on their mobile network from their own subscribers and their device says Mahmoud Samy, Area Head, Middle East, Pakistan and Afghanistan, Arbor Networks
A team of malware developers is preparing to sell a new ransomware programme that encrypts files on infected computers, according to a volunteer group of security researchers who tracked the development of the threat on underground forums in recent weeks.
Yahoo said that malware spread by advertisements served by its European websites had not affected users in North America, Asia Pacific and Latin America as people in these locations did not receive them.
The Middle East and Africa region’s insatiable demand for smarter mobile devices and multimedia content delivered on-the-go is causing telecom operators to battle tremendous growth in mobile traffic on their networks.
Symantec has warned against remote access Trojans, programmes that are installed on a user’s computer without their knowledge and allow attackers to access and control them from remote locations.
While Middle East e-commerce is booming during the December gift season, customers need to better protect their online identity, according to an e-security expert.
Major technology developments over the last year—and a series of revelations about the National Security Agency that shook the international security community—made 2013 an interesting year. In highlighting the past year’s security events, we’ve considered some emerging trends we are likely to see in the coming year.
The overall global Internet threat level grew by 6.9 percentage points in 2013, with 41.6 percent of user computers being attacked at least once, according to Kaspersky Lab.
The feared Cryptolocker ransom Trojan has infected at least a quarter of a million PCs worldwide, a success rate probably generating somewhere in the low millions of dollars in ransom payments, a new analysis by Dell SecureWorks has estimated.
Cybercriminals are using third-party app sites to peddle reverse-engineered or ‘pirate’ versions of almost all the most popular paid apps available on the Google Play and Apple App Stores, software firm Arxan has discovered.
A fake antivirus programme in circulation uses at least a dozen stolen digital code-signing certificates, indicating cybercriminals are increasingly breaching the networks of software developers, Microsoft wrote on Sunday.
Threats lurk within networks, endpoints or devices, often hidden in poorly configured settings or permissions, ineffective data governance, access management and usage policies. These unseen threats come from all perimeters of the organisation and major trends such as BYOD, big data, cloud, and mobile apps have increased the challenge faced by IT leaders.
A Pennsylvania man who hacked into multiple corporate, university and government computer networks and tried to sell access to them, including supercomputers from a U.S. national security laboratory, has been sentenced to 18 months in prison.
Trend Micro has outlined its security predictions for 2014, and it has forecast that one major data breach will occur every month next year.
Hackers infiltrated computers belonging to the foreign affairs ministries of five unnamed European countries ahead of the G20 Summit in September, according to security researchers at FireEye.
They say that good things come in small packages—diamond rings, the crown jewels, keys to an exotic villa. When it comes to the Samsung Galaxy Note 3, big is beautiful, writes James Dartnell.
The new A1-830 tablet ticks all of the right boxes for people interested in a functional tablet sporting the sub 8-inch form factor. The tablet sports a 7.9-in, 1024×768 resolution screen at a 4:3 screen ratio; ideal for web browsing and reading e-books.
Samsung officially unveiled the Galaxy S5 on Monday at a Mobile World Congress presentation in Barcelona, touting a slimmed-down approach to the latest flagship’s feature set and simplified design.