Knowing what is happening on your network is a pre-requisite for security now. A new class of network visibility solutions is emerging to help you spot trouble and address issues.
Will CIOs be forced to take a ‘mobility first’ approach to building networks and is the Middle East really ready to put mobile first?
Palo Alto Networks has announced its new firewall, the PA-7050, which contains full application enablement, IPS and AV.
What do Middle East governments need when it comes to security, and are newly formed government entities set to revolutionise the way that states think about security?
British intelligence agency Government Communications Headquarters (GCHQ) has reportedly infiltrated hacktivist groups and used denial-of-service and other techniques to disrupt their online activities.
Recently, we have been called in to help companies handle attacks from the Syrian Electronic Army (SEA). Our first priority is to help contain the damage, figure out which accounts have been compromised that have not been used yet to cause damage, and clean things up.
IDC recently predicted that CIOs will be forced to take a ‘mobility first’ approach to building networks, whereby mobility solutions and BYOD policies are integrated into infrastructures. How accurate is this prediction, and is the Middle East really ready to put mobile first?
2014 marks the 10th anniversary of Cabir, the world’s first mobile phone malware. To mark this occasion, Fortinet’s FortiGuard Labs is taking a stroll down memory lane to examine the evolution and significance of mobile threats during the last 10 years.
It is difficult to remember the revolution the iPhone caused, says Anthony Perridge, EMEA Channel Director, Sourcefire
The creator of the SpyEye Trojan used to attack millions of online bank accounts has pleaded guilty to conspiracy charges in an Atlanta court.
Cybercrime in 2013 was dominated by a core of around 50 active groups, including Russian and Chinese ‘threat actors’ whose activities are only now coming to light, a report from monitoring firm CrowdStrike has found.
A list of 16 million email addresses and passwords has fallen into the hands of botnet operators, the German Federal Office for Information Security (BSI) said Tuesday.
Changes in Google Chrome extension ownership can expose thousands of users to aggressive advertising and possibly other threats, two extension developers have recently discovered.
Microsoft confirmed on Friday that it will continue to offer its malware scrubbing program to Windows XP users for more than a year after it stops patching the operating system.
More than a third of UAE users do not feel safe making e-payments on their smartphones or tablets, according to research from Kaspersky.
Every large multinational firm investigated by Cisco for its latest Security Report showed signs of malicious traffic on their networks, the networking company has revealed.
The world is still in the foothills of the cyberwar era but already online confrontation is being defined by an unstable and possibly dangerous mixture of proxy conflicts and old-fashioned espionage, mixed with lower-level digital activism, security firm FireEye has said.
Palo Alto Networks has announced enhancements to its enterprise security platform WildFire.
Scammers have devised new ways to trick users into revealing personal information, hand over control of computers and pay for unnecessary software and tech support services, security experts warn.
Kaspersky Lab has recorded thousands of attempts to infect computers used for online banking with a malicious program that its creators claim can attack “any bank in any country”.
A deeper look by Cisco Systems into the cyberattack that infected Yahoo users with malware appears to show a link between the attack and a suspicious affiliate traffic-pushing scheme with roots in Ukraine.
The world’s largest networking vendors have hit back at claims their products have been compromised by the National Security Agency after being named in an NSA spying toolkit.
CNME talks to the InfoWatch CEO
The need for advanced security is heightened further as we witness the transition to the third platform of computing, says Art Coviello, Executive Vice President EMC, Executive Chairman RSA, The Security Division of EMC.
Kaspersky Lab experts have discovered that PC gamers around the globe were hit by 11.7 million attacks in 2013.
Telcos now face threats on their mobile network from their own subscribers and their device says Mahmoud Samy, Area Head, Middle East, Pakistan and Afghanistan, Arbor Networks
A team of malware developers is preparing to sell a new ransomware programme that encrypts files on infected computers, according to a volunteer group of security researchers who tracked the development of the threat on underground forums in recent weeks.
Yahoo said that malware spread by advertisements served by its European websites had not affected users in North America, Asia Pacific and Latin America as people in these locations did not receive them.
The Middle East and Africa region’s insatiable demand for smarter mobile devices and multimedia content delivered on-the-go is causing telecom operators to battle tremendous growth in mobile traffic on their networks.
Symantec has warned against remote access Trojans, programmes that are installed on a user’s computer without their knowledge and allow attackers to access and control them from remote locations.
While Middle East e-commerce is booming during the December gift season, customers need to better protect their online identity, according to an e-security expert.
Major technology developments over the last year—and a series of revelations about the National Security Agency that shook the international security community—made 2013 an interesting year. In highlighting the past year’s security events, we’ve considered some emerging trends we are likely to see in the coming year.
The overall global Internet threat level grew by 6.9 percentage points in 2013, with 41.6 percent of user computers being attacked at least once, according to Kaspersky Lab.
The feared Cryptolocker ransom Trojan has infected at least a quarter of a million PCs worldwide, a success rate probably generating somewhere in the low millions of dollars in ransom payments, a new analysis by Dell SecureWorks has estimated.
Cybercriminals are using third-party app sites to peddle reverse-engineered or ‘pirate’ versions of almost all the most popular paid apps available on the Google Play and Apple App Stores, software firm Arxan has discovered.
A fake antivirus programme in circulation uses at least a dozen stolen digital code-signing certificates, indicating cybercriminals are increasingly breaching the networks of software developers, Microsoft wrote on Sunday.
Threats lurk within networks, endpoints or devices, often hidden in poorly configured settings or permissions, ineffective data governance, access management and usage policies. These unseen threats come from all perimeters of the organisation and major trends such as BYOD, big data, cloud, and mobile apps have increased the challenge faced by IT leaders.
A Pennsylvania man who hacked into multiple corporate, university and government computer networks and tried to sell access to them, including supercomputers from a U.S. national security laboratory, has been sentenced to 18 months in prison.
Trend Micro has outlined its security predictions for 2014, and it has forecast that one major data breach will occur every month next year.
Hackers infiltrated computers belonging to the foreign affairs ministries of five unnamed European countries ahead of the G20 Summit in September, according to security researchers at FireEye.
As Bitcoin’s popularity grows, so does talk about its standing as legal tender, but there are lingering issues that need to be sorted out before people start using Bitcoin to buy everyday things, experts said on Monday.
Trustwave’s SpiderLabs researchers have found a piece of malware that collects data entered into Web-based forms, pretending to be a module for Microsoft’s Internet Information Services (IIS) web-hosting software.
A Russian-speaking group is advertising “bulletproof” hosting for cybercriminals from data centres in Syria and Lebanon, an apparent effort to place new services in locales where Western law enforcement has little influence.
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data.
Thirteen people, including the creator of Blackhole, a popular exploit tool used to infect computers with malware, were arrested and charged in Russia with creating and participating in a criminal organisation.
Samsung officially unveiled the Galaxy S5 on Monday at a Mobile World Congress presentation in Barcelona, touting a slimmed-down approach to the latest flagship’s feature set and simplified design.
The P9982′s price tag is absolutely mad when you think about the device that you’re actually getting, though perhaps it’s the madness that makes it special.
In business, the faster you can deliver on a promise, the better. The three powerful, high-end laptops discussed here deliver data in microseconds.