Kaspersky experts predict growing number of attacks on corporate networks using PrintNightmare vulnerability.
New vulnerability found in Java 7 opens door to 10-year-old attack, researchers say
The vulnerability was reported Thursday to Oracle along with proof-of-concept (PoC) exploit code.
Researchers find another Android attack that can get past signature checks
A second vulnerability that can be exploited to modify legitimate Android apps without breaking their digital signatures has been identified and publicly documented.
Do-it-yourself Big Data
Gulf Air shunned the expensive solutions of the big vendors jumping on the Big Data bandwagon, and became the first Middle East organisation to implement the technology by embracing open-source software with an in-house team.
Safe investment
Quickly expanding strategic investment company, Tawazun, recently teamed up with Huawei in order to commit to its mission to develop the UAE’s defence sector. The company deployed Huawei’s IPv6-based solution across its vast industrial site, as it aims to ensure faster surveillance response times, a stronger technological backbone, and the capabilities for flexibility and expansion.
Ericsson, Mozilla and AT&T demonstrate WebRTC at MWC
Ericsson, Mozilla and AT&T will demonstrate a Web Real-Time Communication (WebRTC) proof of concept at Mobile World Congress 2013 this …
Proof-of-concept malware infects BIOS, network cards
Security researcher Jonathan Brossard created a proof-of-concept hardware backdoor called Rakshasa that replaces a computer’s BIOS (Basic Input Output System) …