Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain …
![](http://www.tahawultech.com/wp-content/uploads/2012/08/network-security-300x224.jpg)
Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain …
The Indian arm of Anonymous is planning what it describes as non-violent protests against Internet censorship in various Indian cities, after some …
The security landscape is rapidly evolving. We speak to distributors and vendors in the region to learn how they are …
Russian-speaking criminals grabbed more than a third of the entire global cybercrime market in 2011 as a growth in online …
Akamai will offer IPv6 services to its entire customer base in April – a long-awaited move that will be a major boon to …
Hacker group Anonymous said over the weekend it had launched DDoS (distributed denial of service) attacks on some Turkish government …
The U.S. federal government’s ongoing effort to improve the security on its Web sites may get a boost now that …
One of two Chinese academic institutions identified in a New York Times report as the apparent source of the recent …
Citigroup and a federal law enforcement source refuted a claim that the bank's customers lost millions of dollars in an …
Many Twitter applications have suffered lengthy periods of downtime recently, a situation that has some developers concerned about the company's …
The technical problems that affected the performance and availability of third-party Twitter applications in recent days have been fixed, the …
Twitter experienced “unexpected” downtime on Saturday, and in order to recover from the problem the company will have to implement …
Although last week's distributed denial-of-service attack on garnered lots of headlines, analysts at Arbor Networks say that the attack was …
Qwest and IBM have signed a five-year agreement that will give Qwest customers access to several IBM managed services targeted …
Worries that the notorious Conficker worm will somehow rise up and devastate the Internet on April 1 are misplaced, security …
By all rights, mobile VoIP sounds like an enticing proposition for a lot of companies. After all, what enterprise wouldn't …
This famous marketing quote from Sun Microsystems is perfectly apt when dealing with security issues like virus/worm outbreak, DOS/DDOS attacks …
UC Berkeley researchers have outlined their view of cloud computing, which they say has great opportunity to exploit unprecedented IT …
Those days it was the centralized anti-virus consoles and the shiny new stateful-inspection firewalls hitting the ME market. The hoopla …