Apple on Sunday addressed a multi-day outage afflicting its developer site, acknowledging that its systems were hacked.
Comguard collaborates with gateprotect for channel workshops
Comguard recently ran a series of special training workshops for both channel partners and end-users on gateprotect Next Generation Firewalls across the region.
SIM cards vulnerable to hacking, says researcher
Millions of mobile phones may be vulnerable to spying due to the use of outdated, 1970s-era cryptography, according to new research due to be presented at the Black Hat security conference.
Issues and opportunities
Given the record number of attendees at this year’s Reseller Middle East Partner Excellence Conference, it was clear that the region’s channel players wanted to hear how to tackle new challenges.
US court renews permission to NSA to collect phone metadata
The Foreign Intelligence Surveillance Court has renewed permission to the US government for a controversial programme to collect telephone metadata in bulk.
WatchGuard rates highest in UTM
WatchGuard Technologies has been awarded a “Performance Verified Certification” by independent test lab, Miercom, for performing nearly 3.5 times faster …
Wall Street batters defences in make-believe cyber-crisis
Wall Street played its own version of war games on Thursday, testing its defences against simulated cyber-attacks bent on taking down US stock exchanges.
New vulnerability found in Java 7 opens door to 10-year-old attack, researchers say
The vulnerability was reported Thursday to Oracle along with proof-of-concept (PoC) exploit code.
BYOD runs wild at most global companies
More and more workers around the world are bringing their personal mobile devices to the office daily, and companies appear to be having trouble keeping up with the trend.
Apple browsers targeted by simple JavaScript ransom scam
Ransom attackers have finally made the jump from Windows to the Mac with news of a stunningly simple hack that tries to trick browser users into paying a $300 (£200) fine using a simple JavaScript routine.
Most BYOD businesses exposing data to cyber criminals
New research has shown that the vast majority of businesses are exposing sensitive corporate data to cyber-criminals by failing to implement effective BYOD strategies.
Why help desk employees are a social engineer's favourite target
A new report from the SANS Institute and RSA on help desk security and privacy finds help desk workers are the easiest victims for a determined social engineering criminal.
Most enterprise networks riddled with vulnerable Java installations, report says
Despite the significant Java security improvements made by Oracle during the past six months, Java vulnerabilities continue to represent a major security risk for organisations.
Possibility in the privacy pitfalls?
Last month, a former CIA technician leaked information on the National Security Agency’s data gathering surveillance programme dubbed PRISM. Joe Lipscombe investigates what relevance this holds for the Middle East.
Signed Macintosh malware uses right-to-left override
Researchers at F-Secure have discovered malware targeting OS X, which leverages a technique called right-to-left override (RLO) in order to spoof its malicious nature.
New Android malware lowers the bar for cyber-criminals
The first tools for injecting legitimate Android apps with open-source software that allows an attacker to control an infected smartphone remotely have been found in the criminal underground.
Building the data centre of the future
Sufian Dweik, Regional Director, MEMA, Brocade Communications, offers a flexible, on-demand strategy for Middle East enterprises.
Unusual file-infecting malware steals FTP credentials, researchers say
A new version of a file-infecting malware program that’s being distributed through drive-by download attacks is also capable of stealing FTP (File Transfer Protocol) credentials.
Shadowlock ransom Trojan demands victims fill in survey for unlock key
Symantec has discovered a bizarre ransom Trojan that eschews the usual demand for payment in favour of asking its victims to fill in an online survey to get an unlock code.
Building the data centre of the future
According to IDC, Middle East IT spending in 2013 is projected to cross the $32 billion mark which is double the global average.