Cybercriminals are using third-party app sites to peddle reverse-engineered or ‘pirate’ versions of almost all the most popular paid apps available on the Google Play and Apple App Stores, software firm Arxan has discovered.
![](https://www.tahawultech.com/wp-content/uploads/2013/12/Smartphone_Worm-1-840x440.jpg)
Cybercriminals are using third-party app sites to peddle reverse-engineered or ‘pirate’ versions of almost all the most popular paid apps available on the Google Play and Apple App Stores, software firm Arxan has discovered.
Virtual desktop infrastructure (VDI) is designed to deliver virtual desktops to client computers over a network from a centralised source. With traditional VDI, you create a master image (reference computer, or core) to use for all clients, then personalise images as needed.
In a potential blow to government surveillance efforts, a federal judge in Washington D.C., today ruled that the National Security Agency’s practice of collecting phone metadata records on millions of Americans may be unconstitutional.
A fake antivirus programme in circulation uses at least a dozen stolen digital code-signing certificates, indicating cybercriminals are increasingly breaching the networks of software developers, Microsoft wrote on Sunday.
With this new device, retailers, banks and financial institutions can identify fraudulent documents and ensure payments are processed with greater security.
Marcus Jewell, vice president, EMEA at Brocade looks into his crystal ball to outline the top technology trends that Middle East enterprises should watch out for in 2014:
Reseller ME looks into what enterprise vendors can do to help their partners increase their margins and therefore achieve higher profits.
Xerox has released results of surveys into mobility in and out of the workplace, which reveal that 38% of workers feel most productive when at home.
Threats lurk within networks, endpoints or devices, often hidden in poorly configured settings or permissions, ineffective data governance, access management and usage policies. These unseen threats come from all perimeters of the organisation and major trends such as BYOD, big data, cloud, and mobile apps have increased the challenge faced by IT leaders.
A Pennsylvania man who hacked into multiple corporate, university and government computer networks and tried to sell access to them, including supercomputers from a U.S. national security laboratory, has been sentenced to 18 months in prison.
Dell customers have given a mixed reception to its recent privatisation deal, causing some to re-evaluate their future relationship with the vendor.
Dell Software yesterday introduced a suite of software and services for enterprise mobility management, including a ‘secure workspace’ for mobile devices that lets enterprise IT managers separate work from data apps.
Critics of the U.S. National Security Agency’s bulk collection of U.S. residents’ telephone records should offer a better way to track terrorists and protect the country against attacks, the agency’s director said Wednesday.
ICANN today issued a report to IT professionals worldwide on how to identify and manage private name space leakage into the public Domain Name System.
IDC has released its predictions for the IT industry in 2014, and said it believes that Middle East spending will exceed $32 billion in the coming year.
Hackers infiltrated computers belonging to the foreign affairs ministries of five unnamed European countries ahead of the G20 Summit in September, according to security researchers at FireEye.
The U.S. Department of Justice (DOJ) is investigating a report that Dell computers have been sold to the Syrian regime via a Dubai-based distributor, despite the trade embargo in place.
And it was all going so well. As vendors began to build more comprehensive cloud-based product roadmaps, Middle Eastern users were beginning to see just how cloud services can streamline their businesses. According to a Gartner report from earlier in the year, cloud adoption was due to grow monumentally in the region up to 2016. This was largely due to issues surrounding security and compliance being ironed out.
It’s a cold, hard fact that enterprises are putting more strain on their networks now than ever before. On top of this, never before has the risk of downtime been more pertinent―businesses simply can’t afford for their networks to be down, even momentarily, meaning the pressure is on CIOs to ensure that all services are up-and-running all of the time.
Arbor Networks’ 2013 research of DDoS activity in the Middle East has revealed that the average size of attacks in the region is 2.376Gbps and the average duration of an attack exceeds an hour and ten minutes.