Researchers from security vendor FireEye have uncovered a new APT (advanced persistent threat) that uses multiple detection evasion techniques, including …
Researchers find another piece of POS malware
A new piece of malware that infects point-of-sale (POS) systems has already been used to compromise thousands of payment cards …
vSkimmer malware targets point-of-sale systems
A new piece of custom malware sold on the underground Internet market is being used to siphon payment card data …
Disabling Java on your Mac
With the news that some Apple, Facebook, and Twitter employees’ Macs were hacked, as well as Apple and Oracle’s subsequent software …
Adobe Reader exploit ‘part of cyber espionage operation’
The head of the malware analysis team at antivirus vendor Kaspersky said last week that a recently found exploit that …
Microsoft, Symantec take down botnet
Microsoft and Symantec on Wednesday announced that they have dismantled a botnet that took over millions of computers for criminal …
Review: Samsung Galaxy Note 2
Is there really any need for a touch-screen phone with a 5.5-inch display? Plenty must think so, given the sales …
‘Red October’ cyber espionage network discovered
A cyber espionage network has been allowed to flourish in Eastern Europe, former Soviet republics and Central Asian countries since …
Is Iran really behind recent stream of DDoS bank attacks?
Though U.S. officials have consistently blamed Iran for the ongoing stream of distributed denial of service attacks (DDoS) against major …
Researchers show proof-of-concept Microsoft ERP hack
Security researchers have presented proof-of-concept code capable of accessing the database driving a Microsoft ERP system and then diverting …
Forecast: The top 5 trends of Middle East IT
Technology has filtered down to infiltrate every part of our routine life and society at large. The Year 2012 …
Introducing iTunes 11
Make no mistake: When you first launch iTunes 11, it’s going to feel awfully different from the iTunes you’ve grown accustomed …
10 reasons why your cloud is only as good as your network
According to a recent study ‘The Five Faces of the Cloud’ by Bain & Company, revenue from sales of …
Lack of cloud protection opens door for botnet attacks, study says
Some cloud providers fail to detect and block malicious traffic originating from their networks, which provides cyber criminals with an …
Over 200 vendors at risk from critical software flaw
CoDeSys, a piece of software running on industrial control systems (ICS) from over 200 vendors contains a vulnerability that allows …
HP advances software-defined networks
HP has rolled out, what it claims is, the industry’s first open-standards-based software-defined network (SDN) technologies to span infrastructure, control …
Islamic hacktivists’ bank attack claims gain credibility
The ‘denial of service’ attack that disrupted the Wells Fargo & Co. electronic banking operations was the fourth since in …
Windows Server 2012 embraces the data centre
Microsoft has taken its server OS a giant step forward with yesterday’s release of Windows Server 2012, making this version …
Future warfare could be online, experts say
Future warfare could be fought by soldiers using bullets and bombs as well as people hunched over laptops according to …
Equipping smartschools for a digital future
Dubai is no stranger to having to proactively adjust its approach to expanding technologies. With the integration of ICT in …