Network security appliance provider Cyberoam has announced the appointment of Bulwark, Emitac Qatar and Sevengate as its distributors for its product NetGenie VDSL2/ADSL2+ Wi-Fi appliances.
FireEye: Cyber warfare defined by espionage and proxy conflicts
The world is still in the foothills of the cyberwar era but already online confrontation is being defined by an unstable and possibly dangerous mixture of proxy conflicts and old-fashioned espionage, mixed with lower-level digital activism, security firm FireEye has said.
For cybersecurity professionals, is the concept of 'control' a pipe dream?
Anthony Perridge, EMEA Channel Director, Sourcefire asks: Is it realistic to expect you can gain control over threats and outbreaks?
Cybercriminals clone pirate versions of top Android and iOS apps
Cybercriminals are using third-party app sites to peddle reverse-engineered or ‘pirate’ versions of almost all the most popular paid apps available on the Google Play and Apple App Stores, software firm Arxan has discovered.
Cyber-crime will not stop for Christmas
Threats lurk within networks, endpoints or devices, often hidden in poorly configured settings or permissions, ineffective data governance, access management and usage policies. These unseen threats come from all perimeters of the organisation and major trends such as BYOD, big data, cloud, and mobile apps have increased the challenge faced by IT leaders.
NSS Labs: cybercriminals have access to 100 zero-day flaws on any day
On any given day cybercriminals and nation states are in possession of as many as 100 zero-day software exploits known only to them, NSS Labs has calculated using the commercial vulnerability market as a baseline.
The Business Side of Cyber Security
Balancing security priorities with business flexibility and agility is a tough challenge, says Anthony Perridge, EMEA Channel Director, Sourcefire.
New Windows privilege escalation flaw exploited in active attacks
Attackers are exploiting a new and unpatched vulnerability in Windows XP and Windows Server 2003 that allows them to execute code with higher privileges than they have access to.
Cybercriminals target Silverlight users with new exploit kit
The creators of a Web-based attack tool called Angler Exploit Kit have added an exploit for a known vulnerability in …
BP locking down personal devices in the face of cyber warfare
Oil giant BP is currently having a “big internal debate” about how it can lock down personal computers without losing out on flexibility for employees, as a direct result of the increasing threat of cyber attacks.
Employees easily tricked on social media prime phishing attacks
Spear phishing is one of the most effective ways to break into a corporate network – and recent studies show that employees can be easily tricked on social media to provide the information needed to launch attacks.
Targeted attacks pose greatest risk to Middle East, says Trend Micro
The biggest cyber-threats facing Middle Eastern businesses today come in the form of targeted attacks, Trend Micro’s Vice President for the Mediterranean, Middle East and Africa regions said today.
UK govt to recruit cyber-reservists from IT industry
United Kingdom defence secretary Philip Hammond has announced that the government is creating a new Joint Cyber Reserve (JCR) made up of computer experts who will work alongside regular forces to protect the nation’s cyber defences.
Two Middle East hackers qualify for Global CyberLympics Finals
Two Middle East ethical hackers from Help AG, a regional information security consulting company, have qualified to participate in the World Finals of the Global CyberLympics, an EC-Council Foundation initiative supported by the United Nation’s International Telecommunications Union (ITU).
China-based hacking group behind hundreds of attacks on U.S. companies
A group of between 50 and 100 professional hackers operating out of China has been systematically targeting businesses, military and government agencies around the world since at least 2009, security vendor Symantec said in a report released on Tuesday.
US carried out 231 'cyber-operations' in 2011 alone, leaked documents show
The US is engaged in a wide-ranging campaign of cyber-operations against foreign targets, launching over 200 in 2011 alone, budget …
How to deal with different types of DNS attacks
DNS servers work by translating IP addresses into domain names. This is why you can enter cnmeonline.com into the browser …
Half of organizations targets of cyberattack in last year
About half of global organizations have suffered a cyberattack in the last year, said a report released on Tuesday by the Information Security Media Group and Bit9.
Hackers steal millions after US banks cyberattack
At least three U.S. banks have lost millions of dollars after fraudsters gained control of payment applications that control wire transfers.
DDoS attacks getting bigger but shorter in duration
Distributed Denial of Service (DDoS) attacks are getting bigger, but their duration are getting shorter, according to an analysis released …