Apple said the WeChat messaging app and car-hailing app DiDi Taxi were among the 25 most popular apps found to be infected with malicious software.
Apple had previously not disclosed which apps had been affecte
There is a massive increase in malware detections on Monday mornings when users reconnect their devices to the corporate network, according to new research published in the annual NTT 2015 Global Threat Intelligence Report.
Cisco has unveiled a host of new capabilities and services that give security professionals extensive intelligence and analysis on potential compromises and solutions to protect against, respond to and recover from attacks.
Experts will reveal technologies and solutions to effectively fight against increasing attacks using advanced malwares at the Gulf Information Security Expo and Conference (Gisec) opening in Dubai, UAE on Monday (April 26).
It’s time for corporate boards to take a role in setting security priorities and expectations, a report said, highlighting a set of security principals as a foundation to respond to the cyber security challenges of today’s world.
The year 2014 was a big year for the cyber security industry with shocking revelations emerging of data breaches of immense scale conducted against some of the largest and most prestigious global organizations.
At the start of the year,
Palo Alto Networks, a leader in enterprise security, unveiled new analysis of malware trends affecting thousands of organisations in major industries throughout the Middle East.
Saeed Agha, general manager, Middle East, sha
Palo Alto Networks has discovered a new family of malware that can infect Apple’s desktop and mobile operating systems, underscoring the increasing sophistication of attacks on iPhones and Mac computers.
Saudi Arabia and UAE posted the highest levels of malware detections in the Middle East over the past year, according to a recent report.
Trend Micro’s Smart Protection Network Feedback pointed out that for the top 10 malwar
Security teams lack the tools and knowledge to detect mobile device security incidents and to proactively investigate and resolve those incidents before major damage is done, according to a research report.