Trend 1: ‘Zero trust’ security makes a comeback In 2018, we can expect to see significant disruption in the cybersecurity …
Egypt’s parliament approves cybercrime bill
A plenary session of the Egyptian parliament, chaired by Speaker Ali Abdel Aal, has reportedly approved the cybercrimes law.0 3846Hackers claim to break iPhone X’s Face ID
When Apple released the iPhone X on November 3, it touched off an immediate race among hackers around the world to be the …
Kaspersky Lab, Council of Europe promote secure and safe Internet
The Council of Europe has signed an agreement with Kaspersky Lab and a number of the world’s leading technology companies, to jointly pledge to promote an open and safe Internet.
Cybercriminals target cryptocurrency, says report
Group-IB, which specialises in preventing and investigating high-tech crimes and online fraud, recently announced the key findings from its annual ‘Hi-Tech Crime Trends 2017’ report.
Gaza Cybergang targets UAE and Saudi Arabia
Kaspersky Lab experts are registering important changes in the operations of the infamous Gaza Cybergang, which is actively targeting multiple …
IBM unveils new encryption technology to limit data breaches
The new system introduces a breakthrough encryption engine that, for the first time, makes it possible to pervasively encrypt data associated with any application, cloud service or database all the time.
UAE employees conceal most IT security incidents: study
The study found that staff would rather put organisations at risk than report a problem because they fear punishment.
STME urges UAE businesses to protect IT systems
STME, an IT solutions provider and systems integrator operating in the Middle East, has issued a strong warning to the …
EastNets adopts AI tech to minimise financial fraud
EastNets, a provider of global compliance, risk and payments solutions, has integrated artificial intelligence (AI) capabilities across its family of solutions.
Credential reuse poses major threats to enterprise security
Digital Shadows has unveiled research into some of the main techniques cybercriminals are using to target organisations using stolen credentials which have been reused across a variety of sites and online forums.