Major technology developments over the last year—and a series of revelations about the National Security Agency that shook the international security community—made 2013 an interesting year. In highlighting the past year’s security events, we’ve considered some emerging trends we are likely to see in the coming year.
Google’s recent hires and buyouts point to a robot-filled future
For as much as Google is known for today, it’s easy to forget that it’s also the force behind a hefty number of research projects. Those projects have led to things like wearables and self-driving cars, but the latest news gives a clear idea of where it’s going next.
Citrix predicts five technology trends in ME for 2014
These trends highlight potential technological development opportunities for businesses across the region.
Dell jumps into enterprise mobility management
Dell Software yesterday introduced a suite of software and services for enterprise mobility management, including a ‘secure workspace’ for mobile devices that lets enterprise IT managers separate work from data apps.
Home appliance makers connect with open source ‘Internet of things’ project
Home appliances, cars and computers could soon be talking to one another thanks to an open source framework that has the backing of consumer electronics manufacturers in a new industry alliance.
Is data complexity blinding your IT decision-making?
According to a new study by Forrester Research, commissioned by Data-as-a-Service firm BDNA, 73 percent of high-level IT decision makers cite the complexity of data as the largest challenge in making effective IT decisions in the next 12 months.
Arbor Networks: point-of-sale malware infections on the rise
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data.
IBM lays plans to be a cloud storage broker
IBM is developing software that will allow organisations to use multiple cloud storage services interchangeably, reducing dependence on any single cloud vendor and ensuring that data remains available even during service outages.
Kaspersky, six others top malware removal tests
Analyst firm A-V Comparative has released its November 2013 list of the antimalware programmes that do the best job of removing malware from an already infected system.
Bleak, bleaker, bleakest: PC market forecast projects historic 10% downturn
This year will go down as the PC industry’s largest contraction, research firm IDC said Monday, with global shipments dropping by double digits and little relief in sight.
Microsoft’s Desktop Optimisation Pack gets Win 8.1 management capabilities
The Microsoft Desktop Optimization Pack (MDOP) suite of IT management tools has been updated with support for Windows 8.1 device and application management and Office 2013 virtualisation.
HP shows signs of improvement after tough spell
Hewlett-Packard reported results for the last quarter of its fiscal year on Tuesday, and although sales were down from a year earlier there were some much-needed signs of improvement.
Vision Solutions’ Double-Take Move makes migrations easier
Enterprise customers can now move from VMware to Windows Server 2012 Hyper-V or Windows Azure with the help of the company’s flagship product, Double-Take Move.
Symantec: ‘Blackshades’ malware still at large
Cybercriminals are increasingly using the “Blackshades” malware program whose source code was leaked three years ago, according to an analysis by Symantec.
Dell Software appoints StarLink as distributor in the Middle East
StarLink will now distribute a broad range of legacy-Quest Software products, which are now a part of Dell Software Group.
Microsoft to deliver Office 2013 SP1 in early 2014
Microsoft today said it will ship the first service pack for Office 2013 sometime early next year.
The worse for malware
Through the advent of mobility, smartphones and tablets are now more dangerous devices to enterprises than laptops and PCs.
Mobile malware continues to proliferate, and at the same time employees are insisting on bringing their personal devices to work.
Cybercriminals target Silverlight users with new exploit kit
The creators of a Web-based attack tool called Angler Exploit Kit have added an exploit for a known vulnerability in …
IBM acquires Fiberlink as mobile-security strategy lynchpin
IBM yesterday announced an agreement to acquire Fiberlink Communications, saying the purchase is a key part of a broader mobile-security strategy to provide assurance in transactions conducted via devices such as iPhones and Android smartphones.
Researchers reveal IE zero-days after hackers set ‘watering hole’ traps
Security researchers have uncovered two unpatched vulnerabilities in Internet Explorer (IE) which have been exploited by attackers in an unusual “watering hole” campaign launched from a U.S.-based website that specialises in domestic and international security policy.