Cyber breaches and insider threats, including malicious insiders stealing, manipulating or destroying data, are the fastest-growing risks and are driving investment in Forensic Data Analytics (FDA), a report said.
Cyber threats around ransomware, attacks on hardware and firmware including automobile systems and infrastructure and the warehousing and sale of stolen data, are among the key issues for IT security in 2016, a report said.
The year 2014 was a big year for the cyber security industry with shocking revelations emerging of data breaches of immense scale conducted against some of the largest and most prestigious global organizations.
At the start of the year,
A total of 6.2 billon malicious attacks on user computers and mobile devices were blocked by Kaspersky Lab antivirus products in 2014, one billion more than in 2013, the vendor of endpoint protection solutions reported.
In 2014 Ka
Shorter working hours during Ramadan and summer vacations mean increased usage of computers and smartphones, placing users at a greater risk of falling victim to viruses, identity theft and a host of other threats, said a security expert.
The year 2012 will see cybercriminals act with even more persistency and sophistication, as the world shifts from the PC-centric desktop toward mobile and cloud computing, said a report.
The repercussion for IT administrators will be an im
Key figures from the Middle East will discuss the implementation of the latest technologies and strategies to minimise future security breaches at an upcoming summit on cyber threats in Abu Dhabi.
Organised by leading business information
Etisalat shared the organization’s perspective on the increasing cyber threats faced by businesses and individual consumers at the recently held third Interpol’s Group of Experts Meeting on IT crime – Mena region.
The two day conference is
With regional efforts to open more websites to users, the need for smart web security becomes even more imperative, feel executives from the Dubai-based Trend Micro, a leading provider of Internet content security.
Web-based attacks are o