An apparently state-sponsored cyberweapon dubbed ‘Guass’ has been unveiled which is targeting banks and individuals in a number of Middle …
Proof-of-concept malware infects BIOS, network cards
Security researcher Jonathan Brossard created a proof-of-concept hardware backdoor called Rakshasa that replaces a computer’s BIOS (Basic Input Output System) …
Targeted attacks against aerospace industry use Sykipot malware
New email-based attacks, some of which target the aerospace industry, are distributing new variants of the Sykipot information stealing malware, …
Middle East engulfed by 'Flame'
A new, highly sophisticated malware threat that was predominantly used in cyberespionage attacks against targets in the Middle East has …
'Hyperspeed signalling' could prevent cyber attacks, claim researchers
Security engineers at the University of Tulsa have found a way to identify cyber attacks before they reach their target, …
Botnet shutdowns cause big 2011 spam drop, Symantec finds
Botnet shutdowns have stemmed the Internet spam flood, taking daily message volumes back to levels last seen as long ago …
WHO-like global cyber security group needed to tackle cyber threats: Kundra
The formation of a global cyber security group similar to the World Health Organisation (WHO) is required in order to …
ESET receives VB100 award
ESET has been awarded the prestigious ‘VB100’award from Virus Bulletin – UK’s independent testing antivirus authority. The latest award is …
Harris Atlas discusses cyber security at roundtable
The world is at the precipice of a migration of technologies according to Dale Meyerrose, VP and GM of Cyberspace …
Dubai Courts discusses MENA’s first e-notary service
Dubai Courts recently completed the MENA region’s first implementation of an e-notary system. At a conference conducted yesterday by Al-Taqnyah, …
Mainframe, meet cloud
Mainframes are stable, secure and under your control – perfect for anchoring a private cloud- but where’s user provisioning? Mention …
Security trends to watch in 2010
The IT industry has reached an inflection point where new malicious programs are actually being created at a higher rate …
Researchers question Microsoft’s botnet take-down
A prominent security researcher today said he doubts Microsoft’s take-down of the Waledac botnet would have any impact on spam …
Researchers question Microsoft's botnet take-down
A prominent security researcher today said he doubts Microsoft's take-down of the Waledac botnet would have any impact on spam …
Juniper, Symantec investigating after Google attack
Juniper Networks and Symantec said that they were investigating a widespread cyber-espionage incident that has hit dozens of technology companies, …
Juniper, Symantec investigating after Google attack
Juniper Networks and Symantec said that they were investigating a widespread cyber-espionage incident that has hit dozens of technology companies, …
Hackers find a home in Amazon’s EC2 cloud
Security researchers have spotted the Zeus botnet running an unauthorized command and control center on Amazon’s EC2 cloud computing infrastructure. …
Hackers find a home in Amazon's EC2 cloud
Security researchers have spotted the Zeus botnet running an unauthorized command and control center on Amazon's EC2 cloud computing infrastructure. …
Cisco’s new structure key to success, Chambers says
Cisco Systems' whirlwind of activity over the past few months wouldn't have been possible without the company's spread-out management structure, …
Pentagon backs off cloud availability claims
Days after claiming 99.999% availability for its new cloud computing service, a U.S. Defense Department spokesman says he misspoke and …