FireEye aims for a cultural shift around advanced security

Anoosha Pervaz by Anoosha Pervaz - September 22nd, 2014

FireEye has announced two solutions that aim to help organisations scale their defense strategies. FireEye as a Service is on-demand security management solution that lets organisations detonate cyber-attacks using FireEye’s technology, intelligence and …

Cisco unveils threat-focused Next-Generation Firewall in ME

Anoosha Pervaz by Anoosha Pervaz - September 16th, 2014

Cisco has launched Next-Generation Firewall (NGFW) with FirePower Services in the Middle East today. Cisco ASA 5500 Series firewall integrates application control, Next-Generation IPS (NGIPS) with Advanced Malware Protection (AMP) to assess threats, …

The problem with e-mail

IDG Reporter by IDG Reporter - September 9th, 2014

Research has highlighted the increased danger of phishing scams from travel and banking websites as well as social media. Agari highlights the banks and industries that are most and least trustworthy.

From bullets to bits

James Dartnell by James Dartnell - September 9th, 2014

In addition to dealing with cybercriminals and hacktivists, enterprise security managers must pay increasing attention to avoid becoming collateral to nation-state cyber-warfare. Do recent high profile attacks on the region indicate that Middle Eastern businesses are at greater risk of attack, and what damage can cyber warfare inflict?

Confronting malware intelligently

Anoosha Pervaz by Anoosha Pervaz - August 26th, 2014

Brian Kenyon, Chief Technology Strategist, McAfee, a part of Intel Security, follows a “define-freeze-fix” approach to eradicate malware, and is confident that his company is well positioned to deal with today’s ever-evolving threat landscape.

Hacker headspace

James Dartnell by James Dartnell - August 19th, 2014

With cybercrime an ever-present danger, hackers around the world attack user data for financial and political gain. But they are not all bad. CNME takes a look at the mindset of hackers good and evil, and how they constantly ask questions of governments and top companies.

Kaspersky: Syrian cyberspace conflict intensifies

Brian Karlovsky by Brian Karlovsky - August 19th, 2014

The cyberspace conflict in the Middle East – particularly Syria – is intensifying as sides exploit malware in a bid to gain advantages, according to Kaspersky Lab’s latest threat research.

Palo Alto uncovers new source of cyberthreats

Jeevan Thankappan by Jeevan Thankappan - July 30th, 2014

Palo Alto Networks has revealed that cyber criminals in Nigeria have evolved common malware campaigns to infiltrate businesses that have not previously been their primary targets. 419 Evolution, a new report released today …

A safe bet

Jeevan Thankappan by Jeevan Thankappan - July 7th, 2014

The OS wars are nothing new. Every user has a laundry list of reasons why their operating system is king. One of the key points in determining which OS reigns supreme is security. CNME investigates the security successes and pitfalls of the most commonly used operating systems.

RSA: Brazilians lose $3.75 billion to Bolware

John E Dunn by John E Dunn - July 6th, 2014

Brazilians using the country’s Boleto Bancrio money payment system could have been swindled out of as much as $3.75 billion by a piece of malware called ‘Bolware’ according to a new analysis by security firm RSA Security.

Microsoft: Kuwait & Algeria malware culprits

Zach Miners by Zach Miners - July 1st, 2014

Microsoft has taken legal action to combat the spread of malware that the company says can be traced to bad actors in Kuwait and Algeria.

Molerats, here for spring

Ayed Alqartah, Senior Systems Engineer, FireEye by Ayed Alqartah, Senior Systems Engineer, FireEye - June 26th, 2014

Between 29th April and 27th May, FireEye Labs identified several new Molerats attacks targeting at least one major U.S. financial institution and multiple European government organisations.

Powerful banking malware Dyreza emerges

Jeevan Thankappan by Jeevan Thankappan - June 17th, 2014

Security researchers said they’ve spotted a new type of banking malware that rivals the capabilities of the infamous Zeus malware. The malware, which is being called “Dyreza” or “Dyre,” uses a man-in-the-middle attack …

Malicious mobility

Annie Bricker by Annie Bricker - June 5th, 2014

From paying bills on our smartphones to banking on our tablets, we are living more and more of our lives on our mobile devices. However, with all of this agility comes a measure of concern.

Iranian hackers create fake news organisation

Jeremy Kirk by Jeremy Kirk - May 29th, 2014

A suspected Iranian hacker group seeded Facebook and LinkedIn with bogus profiles of women and created a fake online news organisation to get digitally closer to more than 2,000 people whom it wanted to spy on.

Virtual lock down

Annie Bricker by Annie Bricker - May 15th, 2014

Virtualisation has made the data centre a more flexible and agile place. However, the trade-off in this software-defined shift is a measure of complexity when it comes to protecting our data. Enterprises must reconsider their protection strategy to reflect the new, virtualised world.

FireEye: Suspected Iranian hackers targeted US defence industry

Jeremy Kirk by Jeremy Kirk - May 14th, 2014

A suspected Iran-based hacking group known for defacing websites has shown increased ambition over the past few months, targeting U.S. defense contractors and Iranian dissidents, according to a new report from security company FireEye.

GISEC turns the spotlight on crucial security tactics

Jeevan Thankappan by Jeevan Thankappan - May 13th, 2014

In the wake of increasing global cybercrimes and cyber-attacks, the importance of information security as the top priority of governments, businesses and security services in the Middle East has prompted significant investments to …

Cisco announces security service, operations centres venture

Ellen Messmer by Ellen Messmer - April 23rd, 2014

Cisco has announced Managed Threat Defense, a set of security services for the enterprise that it is providing through two new operations centres to remotely support intrusion-detection, incident response and forensics, among other services.

Safeguarding intellectual property – your crown jewels

Saeed Agha, General Manager, Middle East, Palo Alto Networks by Saeed Agha, General Manager, Middle East, Palo Alto Networks - April 3rd, 2014

Saeed Agha, General Manager, Middle East, Palo Alto Networks, discusses the importance of protecting sensitive information.

Symantec sacks CEO Steve Bennett

Stephen Lawson by Stephen Lawson - March 23rd, 2014

Symantec fired its second CEO in less than two years on Thursday, dismissing Steve Bennett and putting board member Michael Brown in charge while the security vendor searches for a permanent replacement.

ESET: 25,000 Unix servers hit with backdoor trojan

James Dartnell by James Dartnell - March 20th, 2014

Security researchers at ESET, in collaboration with CERT-Bund, the Swedish National Infrastructure for Computing as well as other agencies, have uncovered a widespread cybercriminal campaign that has seized control of over 25,000 Unix servers worldwide.

McAfee tracks three times as much malware in 2013

IDG Reporter by IDG Reporter - March 11th, 2014

This growth was largely attributed to misuse of automated Content Distribution Networks (CDNs) that wrap malicious code within digitally signed installers. Vincent Weafer, Senior Vice President, McAfee Labs, said point-of-sale (POS) attacks and …

Clear and present danger

Jeevan Thankappan by Jeevan Thankappan - March 5th, 2014

Knowing what is happening on your network is a pre-requisite for security now. A new class of network visibility solutions is emerging to help you spot trouble and address issues.

The ‘mobile first’ approach

James Dartnell by James Dartnell - February 17th, 2014

Will CIOs be forced to take a ‘mobility first’ approach to building networks and is the Middle East really ready to put mobile first?

Palo Alto launches PA-7050 firewall

James Dartnell by James Dartnell - February 12th, 2014

Palo Alto Networks has announced its new firewall, the PA-7050, which contains full application enablement, IPS and AV.

State secrets

Tom Paye by Tom Paye - February 9th, 2014

What do Middle East governments need when it comes to security, and are newly formed government entities set to revolutionise the way that states think about security?

UK’s GCHQ reportedly infiltrated and attacked hacktivist groups

James Dartnell by James Dartnell - February 6th, 2014

British intelligence agency Government Communications Headquarters (GCHQ) has reportedly infiltrated hacktivist groups and used denial-of-service and other techniques to disrupt their online activities.

How to use Syrian Electronic Army attacks to improve security awareness

James Dartnell by James Dartnell - February 4th, 2014

Recently, we have been called in to help companies handle attacks from the Syrian Electronic Army (SEA). Our first priority is to help contain the damage, figure out which accounts have been compromised that have not been used yet to cause damage, and clean things up.

The ‘mobile first’ approach

James Dartnell by James Dartnell - February 3rd, 2014

IDC recently predicted that CIOs will be forced to take a ‘mobility first’ approach to building networks, whereby mobility solutions and BYOD policies are integrated into infrastructures. How accurate is this prediction, and is the Middle East really ready to put mobile first?

History lesson: Mobile malware

Axelle Apvrille, Senior Mobile Malware Analyst Researcher, Fortinet by Axelle Apvrille, Senior Mobile Malware Analyst Researcher, Fortinet - February 2nd, 2014

2014 marks the 10th anniversary of Cabir, the world’s first mobile phone malware. To mark this occasion, Fortinet’s FortiGuard Labs is taking a stroll down memory lane to examine the evolution and significance of mobile threats during the last 10 years.

iPhones change the business landscape

Anthony Perridge, EMEA Channel Director, Sourcefire by Anthony Perridge, EMEA Channel Director, Sourcefire - January 30th, 2014

It is difficult to remember the revolution the iPhone caused, says Anthony Perridge, EMEA Channel Director, Sourcefire

SpyEye bank Trojan creator Aleksandr Panin faces 30 years in jail

John E Dunn by John E Dunn - January 30th, 2014

The creator of the SpyEye Trojan used to attack millions of online bank accounts has pleaded guilty to conspiracy charges in an Atlanta court.

CrowdStrike: Global cybercrime dominated by 50 core groups

By John E Dunn by By John E Dunn - January 26th, 2014

Cybercrime in 2013 was dominated by a core of around 50 active groups, including Russian and Chinese ‘threat actors’ whose activities are only now coming to light, a report from monitoring firm CrowdStrike has found.

16 million online accounts probably compromised, German government warns

Loek Essers by Loek Essers - January 22nd, 2014

A list of 16 million email addresses and passwords has fallen into the hands of botnet operators, the German Federal Office for Information Security (BSI) said Tuesday.

Spammers buy Chrome extensions and turn them into adware

Lucian Constantin by Lucian Constantin - January 21st, 2014

Changes in Google Chrome extension ownership can expose thousands of users to aggressive advertising and possibly other threats, two extension developers have recently discovered.

Microsoft will furnish malware assassin to XP users until mid-2015

Gregg Keizer by Gregg Keizer - January 20th, 2014

Microsoft confirmed on Friday that it will continue to offer its malware scrubbing program to Windows XP users for more than a year after it stops patching the operating system.

Kaspersky: One in three UAE users reject mobile banking

James Dartnell by James Dartnell - January 20th, 2014

More than a third of UAE users do not feel safe making e-payments on their smartphones or tablets, according to research from Kaspersky.

Cisco: Malicious traffic present on 100 percent of sampled networks

John E Dunn by John E Dunn - January 19th, 2014

Every large multinational firm investigated by Cisco for its latest Security Report showed signs of malicious traffic on their networks, the networking company has revealed.

FireEye: Cyber warfare defined by espionage and proxy conflicts

John E Dunn by John E Dunn - January 16th, 2014

The world is still in the foothills of the cyberwar era but already online confrontation is being defined by an unstable and possibly dangerous mixture of proxy conflicts and old-fashioned espionage, mixed with lower-level digital activism, security firm FireEye has said.

Palo Alto upgrades enterprise security platform

James Dartnell by James Dartnell - January 15th, 2014

Palo Alto Networks has announced enhancements to its enterprise security platform WildFire.

Tech support scammers are targeting mobile users, researchers say

Lucian Constantin by Lucian Constantin - January 15th, 2014

Scammers have devised new ways to trick users into revealing personal information, hand over control of computers and pay for unnecessary software and tech support services, security experts warn.

Kaspersky Lab: Beware of Neverquest Trojan banker

James Dartnell by James Dartnell - January 13th, 2014

Kaspersky Lab has recorded thousands of attempts to infect computers used for online banking with a malicious program that its creators claim can attack “any bank in any country”.

Yahoo malvertising attack linked to larger malware scheme

Jeremy Kirk by Jeremy Kirk - January 13th, 2014

A deeper look by Cisco Systems into the cyberattack that infected Yahoo users with malware appears to show a link between the attack and a suspicious affiliate traffic-pushing scheme with roots in Ukraine.

Dell, Cisco, others hit back after being named in NSA spying toolkit

Brian Karlovsky by Brian Karlovsky - January 13th, 2014

The world’s largest networking vendors have hit back at claims their products have been compromised by the National Security Agency after being named in an NSA spying toolkit.

  • Hands-on: New iPhones pack big features in thin package

    Few announcements summon as much attention as a brand new iPhone, and this year, for the second time in as many years, Apple gave us two models of its smartphone to pore over. I got my mitts on the newest mobile devices in the hands-on area after Tuesday’s event.

  • Review: Samsung Galaxy Note 3

    They say that good things come in small packages—diamond rings, the crown jewels, keys to an exotic villa. When it comes to the Samsung Galaxy Note 3, big is beautiful, writes James Dartnell.

  • Acer takes on the Nexus 7 with 7.9″ Intel tablet

    The new A1-830 tablet ticks all of the right boxes for people interested in a functional tablet sporting the sub 8-inch form factor. The tablet sports a 7.9-in, 1024×768 resolution screen at a 4:3 screen ratio; ideal for web browsing and reading e-books.

Copyright 2014 Computer News Middle East. All rights reserved. Product of CPI Media Group. For more information e-mail us at Privacy Policy
SUBSCRIBE TO OUR NEWSLETTER * E-mail * First name: * Last name:
* Job title: * Industry sector: * Country: