BlackBerry’s latest financial results, which were announced mid-December, show that the company has a lot to do before it gets back to any level of solid footing.
![](https://www.tahawultech.com/wp-content/uploads/2014/01/blackberry-rt-1-840x440.jpg)
BlackBerry’s latest financial results, which were announced mid-December, show that the company has a lot to do before it gets back to any level of solid footing.
The U.S. National Security Agency was developing a software implant in 2008 for Apple iPhones that allowed the agency to take almost total control of the device, including retrieving text messages and voicemail and remotely turning on its microphone and camera, according to a report by Der Spiegel.
Reading the coverage of the recent breach of Adobe passwords, we learned that 1.9 million users used “123456” as their password. That’s right: out of 38 million cracked passwords, almost two million adults used ones more suited to five-year-olds.
Threats lurk within networks, endpoints or devices, often hidden in poorly configured settings or permissions, ineffective data governance, access management and usage policies. These unseen threats come from all perimeters of the organisation and major trends such as BYOD, big data, cloud, and mobile apps have increased the challenge faced by IT leaders.
The stakeholders of the channel gathered together for the second edition of Reseller Hot 50 Awards, which was held at H Hotel in Dubai.
Security researches at Symantec are gradually raising warnings that the Internet of Things will increase, by multitudes, the number of things that can be hacked and attacked.
Balancing security priorities with business flexibility and agility is a tough challenge, says Anthony Perridge, EMEA Channel Director, Sourcefire.
The U.S. National Security Agency reportedly hacked into over 50,000 computer networks around the world as part of its global intelligence gathering efforts, and also taps into large fiber optic cables that transport Internet traffic between continents at 20 different major points.
Westcon Middle East has signed a new distribution agreement with Palo Alto Networks. The agreement will cover Palo Alto Networks’ …
We just found 30 servers that can’t be accounted for. Thirty Internet-facing servers with no malware protection and patchy histories. I need to take a deep breath and figure out just how bad this is and what we can do to stop this sort of thing from happening again.
The model of buying cloud computing resources is different from that of buying traditional hardware and software. Instead of buying licences and investing in equipment, in a cloud computing model, users pay for the resources they use – no more, no less.
HP aims to showcase an enormous range of enterprise solutions at GITEX Technology Week 2013, with cloud, security, Big Data and mobility forming the crux of the vendor’s participation at the show.
Intel has signed a deal to acquire Sensory Networks, a provider of software pattern matching technology for network security applications.
The Swedish Svea Court of Appeal has overturned a verdict against Gottfrid Svartholm Warg for intrusion and fraud against Nordea bank, but has upheld the verdict finding him guilty of hacking IT firm Logica.
The Federal Circuit Court of Australia has awarded Microsoft $304,994.95 in damages after Paul McLane, trading as Software Paul, was …
A growing number of experienced hackers have begun offering structured hacking courses for crooks seeking to make a career in cybercrime.
With its $7.2 billion agreement to buy Nokia’s handset business, Microsoft is in a position to surpass Apple and Android smartphone makers in providing an enterprise-class mobile platform, experts say.
VMware’s NSX network virtualization platform, expected out by year end, will have a key security tool for deploying security software and services to VMware-based virtual machines.
About half of global organizations have suffered a cyberattack in the last year, said a report released on Tuesday by the Information Security Media Group and Bit9.
StarLink announced this week that its distribution relationship with Dell Software Group has been extended to include SonicWall covering Saudi Arabia, Turkey, Egypt, Jordan and Lebanon.