FireEye has announced two solutions that aim to help organisations scale their defense strategies. FireEye as a Service is on-demand security management solution that lets organisations detonate cyber-attacks using FireEye’s technology, intelligence and …
Cisco has launched Next-Generation Firewall (NGFW) with FirePower Services in the Middle East today. Cisco ASA 5500 Series firewall integrates application control, Next-Generation IPS (NGIPS) with Advanced Malware Protection (AMP) to assess threats, …
Research has highlighted the increased danger of phishing scams from travel and banking websites as well as social media. Agari highlights the banks and industries that are most and least trustworthy.
In addition to dealing with cybercriminals and hacktivists, enterprise security managers must pay increasing attention to avoid becoming collateral to nation-state cyber-warfare. Do recent high profile attacks on the region indicate that Middle Eastern businesses are at greater risk of attack, and what damage can cyber warfare inflict?
Brian Kenyon, Chief Technology Strategist, McAfee, a part of Intel Security, follows a “define-freeze-fix” approach to eradicate malware, and is confident that his company is well positioned to deal with today’s ever-evolving threat landscape.
With cybercrime an ever-present danger, hackers around the world attack user data for financial and political gain. But they are not all bad. CNME takes a look at the mindset of hackers good and evil, and how they constantly ask questions of governments and top companies.
The cyberspace conflict in the Middle East – particularly Syria – is intensifying as sides exploit malware in a bid to gain advantages, according to Kaspersky Lab’s latest threat research.
Palo Alto Networks has revealed that cyber criminals in Nigeria have evolved common malware campaigns to infiltrate businesses that have not previously been their primary targets. 419 Evolution, a new report released today …
The OS wars are nothing new. Every user has a laundry list of reasons why their operating system is king. One of the key points in determining which OS reigns supreme is security. CNME investigates the security successes and pitfalls of the most commonly used operating systems.
Brazilians using the country’s Boleto Bancrio money payment system could have been swindled out of as much as $3.75 billion by a piece of malware called ‘Bolware’ according to a new analysis by security firm RSA Security.
Microsoft has taken legal action to combat the spread of malware that the company says can be traced to bad actors in Kuwait and Algeria.
Between 29th April and 27th May, FireEye Labs identified several new Molerats attacks targeting at least one major U.S. financial institution and multiple European government organisations.
Security researchers said they’ve spotted a new type of banking malware that rivals the capabilities of the infamous Zeus malware. The malware, which is being called “Dyreza” or “Dyre,” uses a man-in-the-middle attack …
From paying bills on our smartphones to banking on our tablets, we are living more and more of our lives on our mobile devices. However, with all of this agility comes a measure of concern.
A suspected Iranian hacker group seeded Facebook and LinkedIn with bogus profiles of women and created a fake online news organisation to get digitally closer to more than 2,000 people whom it wanted to spy on.
Virtualisation has made the data centre a more flexible and agile place. However, the trade-off in this software-defined shift is a measure of complexity when it comes to protecting our data. Enterprises must reconsider their protection strategy to reflect the new, virtualised world.
A suspected Iran-based hacking group known for defacing websites has shown increased ambition over the past few months, targeting U.S. defense contractors and Iranian dissidents, according to a new report from security company FireEye.
In the wake of increasing global cybercrimes and cyber-attacks, the importance of information security as the top priority of governments, businesses and security services in the Middle East has prompted significant investments to …
Cisco has announced Managed Threat Defense, a set of security services for the enterprise that it is providing through two new operations centres to remotely support intrusion-detection, incident response and forensics, among other services.
Saeed Agha, General Manager, Middle East, Palo Alto Networks, discusses the importance of protecting sensitive information.
Symantec fired its second CEO in less than two years on Thursday, dismissing Steve Bennett and putting board member Michael Brown in charge while the security vendor searches for a permanent replacement.
Security researchers at ESET, in collaboration with CERT-Bund, the Swedish National Infrastructure for Computing as well as other agencies, have uncovered a widespread cybercriminal campaign that has seized control of over 25,000 Unix servers worldwide.
This growth was largely attributed to misuse of automated Content Distribution Networks (CDNs) that wrap malicious code within digitally signed installers. Vincent Weafer, Senior Vice President, McAfee Labs, said point-of-sale (POS) attacks and …
Knowing what is happening on your network is a pre-requisite for security now. A new class of network visibility solutions is emerging to help you spot trouble and address issues.
Will CIOs be forced to take a ‘mobility first’ approach to building networks and is the Middle East really ready to put mobile first?
Palo Alto Networks has announced its new firewall, the PA-7050, which contains full application enablement, IPS and AV.
What do Middle East governments need when it comes to security, and are newly formed government entities set to revolutionise the way that states think about security?
British intelligence agency Government Communications Headquarters (GCHQ) has reportedly infiltrated hacktivist groups and used denial-of-service and other techniques to disrupt their online activities.
Recently, we have been called in to help companies handle attacks from the Syrian Electronic Army (SEA). Our first priority is to help contain the damage, figure out which accounts have been compromised that have not been used yet to cause damage, and clean things up.
IDC recently predicted that CIOs will be forced to take a ‘mobility first’ approach to building networks, whereby mobility solutions and BYOD policies are integrated into infrastructures. How accurate is this prediction, and is the Middle East really ready to put mobile first?
2014 marks the 10th anniversary of Cabir, the world’s first mobile phone malware. To mark this occasion, Fortinet’s FortiGuard Labs is taking a stroll down memory lane to examine the evolution and significance of mobile threats during the last 10 years.
It is difficult to remember the revolution the iPhone caused, says Anthony Perridge, EMEA Channel Director, Sourcefire
The creator of the SpyEye Trojan used to attack millions of online bank accounts has pleaded guilty to conspiracy charges in an Atlanta court.
Cybercrime in 2013 was dominated by a core of around 50 active groups, including Russian and Chinese ‘threat actors’ whose activities are only now coming to light, a report from monitoring firm CrowdStrike has found.
A list of 16 million email addresses and passwords has fallen into the hands of botnet operators, the German Federal Office for Information Security (BSI) said Tuesday.
Changes in Google Chrome extension ownership can expose thousands of users to aggressive advertising and possibly other threats, two extension developers have recently discovered.
Microsoft confirmed on Friday that it will continue to offer its malware scrubbing program to Windows XP users for more than a year after it stops patching the operating system.
More than a third of UAE users do not feel safe making e-payments on their smartphones or tablets, according to research from Kaspersky.
Every large multinational firm investigated by Cisco for its latest Security Report showed signs of malicious traffic on their networks, the networking company has revealed.
The world is still in the foothills of the cyberwar era but already online confrontation is being defined by an unstable and possibly dangerous mixture of proxy conflicts and old-fashioned espionage, mixed with lower-level digital activism, security firm FireEye has said.
Palo Alto Networks has announced enhancements to its enterprise security platform WildFire.
Scammers have devised new ways to trick users into revealing personal information, hand over control of computers and pay for unnecessary software and tech support services, security experts warn.
Kaspersky Lab has recorded thousands of attempts to infect computers used for online banking with a malicious program that its creators claim can attack “any bank in any country”.
A deeper look by Cisco Systems into the cyberattack that infected Yahoo users with malware appears to show a link between the attack and a suspicious affiliate traffic-pushing scheme with roots in Ukraine.
The world’s largest networking vendors have hit back at claims their products have been compromised by the National Security Agency after being named in an NSA spying toolkit.
Few announcements summon as much attention as a brand new iPhone, and this year, for the second time in as many years, Apple gave us two models of its smartphone to pore over. I got my mitts on the newest mobile devices in the hands-on area after Tuesday’s event.
They say that good things come in small packages—diamond rings, the crown jewels, keys to an exotic villa. When it comes to the Samsung Galaxy Note 3, big is beautiful, writes James Dartnell.
The new A1-830 tablet ticks all of the right boxes for people interested in a functional tablet sporting the sub 8-inch form factor. The tablet sports a 7.9-in, 1024×768 resolution screen at a 4:3 screen ratio; ideal for web browsing and reading e-books.