Cybersecurity researchers have reportedly found a new security flaw that affects a wide variety of modern computing chips and is related to the Spectre and Meltdown chip flaws that emerged in January.
Excessive technology use to blame for child obesity in UAE, Saudi Arabia
Nine in 10 children across UAE and KSA have access to tablets, smartphones or other handheld electronic devices with screens.1 3763Personal devices pose huge security risks to enterprises: study
A recent study revealed that the cybersecurity risk posed to enterprises by personal devices and Internet of Things devices are rising in significance.
New Nokia devices now available in UAE
HMD Global, the home of Nokia phones, has announced that the Nokia 7 plus and the new Nokia 6 are …
Dubai launches research platform to assess security of IoT devices
The platform, established by DESC and the University of Sharjah, allows organisations to verify the effectiveness of existing cybersecurity measures on their IoT enabled devices.
Saudi Arabia unveils first locally made educational tablet
KTAB was produced in partnership between King Abdul Aziz City for Science and Technology (KASCST) and Mesbah Saudi Technology Company, a large team of engineers and developers, according to Arab News.
HP unveils new set of Device-as-a-Service offering
HP Inc. has launched a new set of Device-as-a-Service (DaaS) offerings for customers and partners, including new predictive analytics capabilities …
Worldwide device shipments to reach 2.32 billion units in 2018: Gartner
Worldwide shipments of devices — PCs, tablets and mobile phones — totaled 2.28 billion units in 2017, according to Gartner. …
HP enhances workstations and unveils new products
At SOLIDWORKS World, HP has announced it will power its bestselling performance workstation, the HP Z4, with a choice of …
How MU-MIMO can improve wireless connectivity
The only thing techies love more than creating acronyms is the chance to create even longer ones. Such is the …
6 reasons why enterprises fail to focus on the real security threats
Computer defenders often spend time, money, and other resources on computer defences that don’t stop the biggest threats to their environment. What is causing this lack of focus in putting the right defences in the right places in the right amounts against the right threats?