Safeguarding intellectual property – your crown jewels

Saeed Agha, General Manager, Middle East, Palo Alto Networks by Saeed Agha, General Manager, Middle East, Palo Alto Networks - April 3rd, 2014

Saeed Agha, General Manager, Middle East, Palo Alto Networks, discusses the importance of protecting sensitive information.

Symantec sacks CEO Steve Bennett

Stephen Lawson by Stephen Lawson - March 23rd, 2014

Symantec fired its second CEO in less than two years on Thursday, dismissing Steve Bennett and putting board member Michael Brown in charge while the security vendor searches for a permanent replacement.

ESET: 25,000 Unix servers hit with backdoor trojan

James Dartnell by James Dartnell - March 20th, 2014

Security researchers at ESET, in collaboration with CERT-Bund, the Swedish National Infrastructure for Computing as well as other agencies, have uncovered a widespread cybercriminal campaign that has seized control of over 25,000 Unix servers worldwide.

McAfee tracks three times as much malware in 2013

IDG Reporter by IDG Reporter - March 11th, 2014

This growth was largely attributed to misuse of automated Content Distribution Networks (CDNs) that wrap malicious code within digitally signed installers. Vincent Weafer, Senior Vice President, McAfee Labs, said point-of-sale (POS) attacks and …

Clear and present danger

Jeevan Thankappan by Jeevan Thankappan - March 5th, 2014

Knowing what is happening on your network is a pre-requisite for security now. A new class of network visibility solutions is emerging to help you spot trouble and address issues.

The ‘mobile first’ approach

James Dartnell by James Dartnell - February 17th, 2014

Will CIOs be forced to take a ‘mobility first’ approach to building networks and is the Middle East really ready to put mobile first?

Palo Alto launches PA-7050 firewall

James Dartnell by James Dartnell - February 12th, 2014

Palo Alto Networks has announced its new firewall, the PA-7050, which contains full application enablement, IPS and AV.

State secrets

Tom Paye by Tom Paye - February 9th, 2014

What do Middle East governments need when it comes to security, and are newly formed government entities set to revolutionise the way that states think about security?

UK’s GCHQ reportedly infiltrated and attacked hacktivist groups

James Dartnell by James Dartnell - February 6th, 2014

British intelligence agency Government Communications Headquarters (GCHQ) has reportedly infiltrated hacktivist groups and used denial-of-service and other techniques to disrupt their online activities.

How to use Syrian Electronic Army attacks to improve security awareness

James Dartnell by James Dartnell - February 4th, 2014

Recently, we have been called in to help companies handle attacks from the Syrian Electronic Army (SEA). Our first priority is to help contain the damage, figure out which accounts have been compromised that have not been used yet to cause damage, and clean things up.

The ‘mobile first’ approach

James Dartnell by James Dartnell - February 3rd, 2014

IDC recently predicted that CIOs will be forced to take a ‘mobility first’ approach to building networks, whereby mobility solutions and BYOD policies are integrated into infrastructures. How accurate is this prediction, and is the Middle East really ready to put mobile first?

History lesson: Mobile malware

Axelle Apvrille, Senior Mobile Malware Analyst Researcher, Fortinet by Axelle Apvrille, Senior Mobile Malware Analyst Researcher, Fortinet - February 2nd, 2014

2014 marks the 10th anniversary of Cabir, the world’s first mobile phone malware. To mark this occasion, Fortinet’s FortiGuard Labs is taking a stroll down memory lane to examine the evolution and significance of mobile threats during the last 10 years.

iPhones change the business landscape

Anthony Perridge, EMEA Channel Director, Sourcefire by Anthony Perridge, EMEA Channel Director, Sourcefire - January 30th, 2014

It is difficult to remember the revolution the iPhone caused, says Anthony Perridge, EMEA Channel Director, Sourcefire

SpyEye bank Trojan creator Aleksandr Panin faces 30 years in jail

John E Dunn by John E Dunn - January 30th, 2014

The creator of the SpyEye Trojan used to attack millions of online bank accounts has pleaded guilty to conspiracy charges in an Atlanta court.

CrowdStrike: Global cybercrime dominated by 50 core groups

By John E Dunn by By John E Dunn - January 26th, 2014

Cybercrime in 2013 was dominated by a core of around 50 active groups, including Russian and Chinese ‘threat actors’ whose activities are only now coming to light, a report from monitoring firm CrowdStrike has found.

16 million online accounts probably compromised, German government warns

Loek Essers by Loek Essers - January 22nd, 2014

A list of 16 million email addresses and passwords has fallen into the hands of botnet operators, the German Federal Office for Information Security (BSI) said Tuesday.

Spammers buy Chrome extensions and turn them into adware

Lucian Constantin by Lucian Constantin - January 21st, 2014

Changes in Google Chrome extension ownership can expose thousands of users to aggressive advertising and possibly other threats, two extension developers have recently discovered.

Microsoft will furnish malware assassin to XP users until mid-2015

Gregg Keizer by Gregg Keizer - January 20th, 2014

Microsoft confirmed on Friday that it will continue to offer its malware scrubbing program to Windows XP users for more than a year after it stops patching the operating system.

Kaspersky: One in three UAE users reject mobile banking

James Dartnell by James Dartnell - January 20th, 2014

More than a third of UAE users do not feel safe making e-payments on their smartphones or tablets, according to research from Kaspersky.

Cisco: Malicious traffic present on 100 percent of sampled networks

John E Dunn by John E Dunn - January 19th, 2014

Every large multinational firm investigated by Cisco for its latest Security Report showed signs of malicious traffic on their networks, the networking company has revealed.

FireEye: Cyber warfare defined by espionage and proxy conflicts

John E Dunn by John E Dunn - January 16th, 2014

The world is still in the foothills of the cyberwar era but already online confrontation is being defined by an unstable and possibly dangerous mixture of proxy conflicts and old-fashioned espionage, mixed with lower-level digital activism, security firm FireEye has said.

Palo Alto upgrades enterprise security platform

James Dartnell by James Dartnell - January 15th, 2014

Palo Alto Networks has announced enhancements to its enterprise security platform WildFire.

Tech support scammers are targeting mobile users, researchers say

Lucian Constantin by Lucian Constantin - January 15th, 2014

Scammers have devised new ways to trick users into revealing personal information, hand over control of computers and pay for unnecessary software and tech support services, security experts warn.

Kaspersky Lab: Beware of Neverquest Trojan banker

James Dartnell by James Dartnell - January 13th, 2014

Kaspersky Lab has recorded thousands of attempts to infect computers used for online banking with a malicious program that its creators claim can attack “any bank in any country”.

Yahoo malvertising attack linked to larger malware scheme

Jeremy Kirk by Jeremy Kirk - January 13th, 2014

A deeper look by Cisco Systems into the cyberattack that infected Yahoo users with malware appears to show a link between the attack and a suspicious affiliate traffic-pushing scheme with roots in Ukraine.

Dell, Cisco, others hit back after being named in NSA spying toolkit

Brian Karlovsky by Brian Karlovsky - January 13th, 2014

The world’s largest networking vendors have hit back at claims their products have been compromised by the National Security Agency after being named in an NSA spying toolkit.

CNME Q&A: Natalya Kaspersky

James Dartnell by James Dartnell - January 8th, 2014

CNME talks to the InfoWatch CEO

2014: Great risks, greater responsibilities

Art Coviello, Executive Vice President EMC, Executive Chairman RSA. by Art Coviello, Executive Vice President EMC, Executive Chairman RSA. - January 8th, 2014

The need for advanced security is heightened further as we witness the transition to the third platform of computing, says Art Coviello, Executive Vice President EMC, Executive Chairman RSA, The Security Division of EMC.

Kaspersky Lab finds gamers attacked 11.7 million times in 2013

James Dartnell by James Dartnell - January 7th, 2014

Kaspersky Lab experts have discovered that PC gamers around the globe were hit by 11.7 million attacks in 2013.

Mobile internet subscribers may unknowingly pose greatest threat to Middle East telcos

Mahmoud Samy, Area Head, Middle East, Pakistan and Afghanistan, Arbor Networks by Mahmoud Samy, Area Head, Middle East, Pakistan and Afghanistan, Arbor Networks - January 7th, 2014

Telcos now face threats on their mobile network from their own subscribers and their device says Mahmoud Samy, Area Head, Middle East, Pakistan and Afghanistan, Arbor Networks

Cybercrooks developing dangerous new file-encrypting ransomware, researchers warn

Lucian Constantin by Lucian Constantin - January 7th, 2014

A team of malware developers is preparing to sell a new ransomware programme that encrypts files on infected computers, according to a volunteer group of security researchers who tracked the development of the threat on underground forums in recent weeks.

Malware from Yahoo ads did not affect US and Mac and mobile users

John Ribeiro by John Ribeiro - January 7th, 2014

Yahoo said that malware spread by advertisements served by its European websites had not affected users in North America, Asia Pacific and Latin America as people in these locations did not receive them.

Mobile internet subscribers unknowingly pose greatest threat to Middle East telcos

Mahmoud Samy, Area Head, Middle East, Pakistan and Afghanistan, Arbor Networks by Mahmoud Samy, Area Head, Middle East, Pakistan and Afghanistan, Arbor Networks - January 6th, 2014

The Middle East and Africa region’s insatiable demand for smarter mobile devices and multimedia content delivered on-the-go is causing telecom operators to battle tremendous growth in mobile traffic on their networks.

Symantec: beware of remote access trojans

James Dartnell by James Dartnell - January 6th, 2014

Symantec has warned against remote access Trojans, programmes that are installed on a user’s computer without their knowledge and allow attackers to access and control them from remote locations.

‘Beware of e-retail’ Ponemon & RSA Security tell Middle East

James Dartnell by James Dartnell - December 22nd, 2013

While Middle East e-commerce is booming during the December gift season, customers need to better protect their online identity, according to an e-security expert.

SophosLabs’ trends to watch in 2014

SophosLabs by SophosLabs - December 22nd, 2013

Major technology developments over the last year—and a series of revelations about the National Security Agency that shook the international security community—made 2013 an interesting year. In highlighting the past year’s security events, we’ve considered some emerging trends we are likely to see in the coming year.

Kaspersky Lab: global internet threat up 6.9 percent in 2013

James Dartnell by James Dartnell - December 22nd, 2013

The overall global Internet threat level grew by 6.9 percentage points in 2013, with 41.6 percent of user computers being attacked at least once, according to Kaspersky Lab.

Dell SecureWorks: Cryptolocker ransom Trojan infected 250,000 PCs

John E Dunn by John E Dunn - December 22nd, 2013

The feared Cryptolocker ransom Trojan has infected at least a quarter of a million PCs worldwide, a success rate probably generating somewhere in the low millions of dollars in ransom payments, a new analysis by Dell SecureWorks has estimated.

Cybercriminals clone pirate versions of top Android and iOS apps

By John E Dunn by By John E Dunn - December 17th, 2013

Cybercriminals are using third-party app sites to peddle reverse-engineered or ‘pirate’ versions of almost all the most popular paid apps available on the Google Play and Apple App Stores, software firm Arxan has discovered.

Microsoft: bogus antivirus programme uses a dozen stolen signing certificates

Jeremy Kirk by Jeremy Kirk - December 16th, 2013

A fake antivirus programme in circulation uses at least a dozen stolen digital code-signing certificates, indicating cybercriminals are increasingly breaching the networks of software developers, Microsoft wrote on Sunday.

Cyber-crime will not stop for Christmas

Florian Malecki, EMEA Solution & Product Marketing Director, Dell Software by Florian Malecki, EMEA Solution & Product Marketing Director, Dell Software - December 15th, 2013

Threats lurk within networks, endpoints or devices, often hidden in poorly configured settings or permissions, ineffective data governance, access management and usage policies. These unseen threats come from all perimeters of the organisation and major trends such as BYOD, big data, cloud, and mobile apps have increased the challenge faced by IT leaders.

U.S. hacker who sold documents to FBI jailed for 18 months

Juan Carlos Perez by Juan Carlos Perez - December 15th, 2013

A Pennsylvania man who hacked into multiple corporate, university and government computer networks and tried to sell access to them, including supercomputers from a U.S. national security laboratory, has been sentenced to 18 months in prison.

Trend Micro reveals 2014 security forecast

James Dartnell by James Dartnell - December 12th, 2013

Trend Micro has outlined its security predictions for 2014, and it has forecast that one major data breach will occur every month next year.

FireEye: Syria-themed emails infiltrated European ministries before G20

Lucian Constantin by Lucian Constantin - December 11th, 2013

Hackers infiltrated computers belonging to the foreign affairs ministries of five unnamed European countries ahead of the G20 Summit in September, according to security researchers at FireEye.

What’s stopping Bitcoin from hitting the mass market

Zach Miners by Zach Miners - December 10th, 2013

As Bitcoin’s popularity grows, so does talk about its standing as legal tender, but there are lingering issues that need to be sorted out before people start using Bitcoin to buy everyday things, experts said on Monday.

Cloud 360 Roadshow 2014 - Doha, Dubai, Riyadh Cloud 360 Roadshow 2014 - Doha, Dubai, Riyadh

Copyright 2014 Computer News Middle East. All rights reserved. Product of CPI Media Group. For more information e-mail us at webmaster@cpimediagroup.com. Privacy Policy