The creation of Android malware is now mature enough for there to be development cycles that mimic those of the legitimate software world, a report from Juniper Networks has concluded.
![](https://www.tahawultech.com/wp-content/uploads/2013/06/zombie-android-1-840x440.jpg)
The creation of Android malware is now mature enough for there to be development cycles that mimic those of the legitimate software world, a report from Juniper Networks has concluded.
The latest research by Symantec has found that top-tier SMBs spend roughly seven percent less on IT than the bottom tier.
The things that cyber-criminals are able to do with your phone are terrifying.
Spectrami recently held a TechCafe workshop with General Dynamics Fidelis Cybersecurity Solutions to address the concerns over IT security attacks …
Microsoft and the U.S. Federal Bureau of Investigation have taken aim at a botnet network based on malware called Citadel …
CNME partnered with Huawei for a leadership roundtable conference to discover how hotels and residential buildings can “jump on the …
Big Data has morphed from silent, misunderstood elephant in the room into a huge opportunity for ambitious VARs, says Condo …
A new variant of the Citadel financial malware is targeting users of the Payza online payment platform by launching local …
The amount of cyber-criminal activity associated with the Zeus family of financial Trojan programs has increased during the past few …
Security researchers have identified multiple samples of the recently discovered “KitM” spyware for Mac OS X, including one dating back …
In 1971, John Draper used a whistle, found in a cereal box, to reproduce a 2,600 Hz tone able to …
StarLink on Tuesday announced that it had been signed as master distributor for Guidance Software in the Middle East. The …
The Dutch government on Thursday presented a draft bill that aims to give law enforcement the power to hack into …
Technology organisations are among the most frequently attacked by hackers, according to the latest ‘Advanced Cyber Attack Landscape’ report and …
Cyber criminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large …
The man suspected of participating in a large DDoS attack on an anti-spam organisation that caused intermittent Internet hiccups drove …
Resist or go with the flow? The BYOD boom may bring new security challenges but it is the reluctant businesses …
Value-added distributor Shifra has completed a Middle Eastern roadshow with partner-vendors Proofpoint, Centrify and Stonesoft, the firm announced on Saturday. …
Businesses continue to plunge into cloud computing with gusto, but are they fully aware of the challenges surrounding the number …