Archive

Amazon put a quick stop to an issue in Alexa’s skill set after Chexmarx researchers reported that her skill set could be expanded to listen in on users not just some of the time but all of the time. According to a Checkmarx research

The Gulf Information Security Expo & Conference (GISEC) brings together over 7,350 top IT security and tech sector professionals to discover cutting-edge solutions, share insights with industry experts and equip themselves with the right tools to protect their businesses from

Western Digital’s My Cloud EX2 storage devices leak files to anyone on a local network by default, no matter the permissions set by users. If configured for remote access via the public internet, the My Cloud EX2 also leaks files

Ukraine’s energy and coal ministry website has been hit by a ransomware attack demanding Bitcoin to recover encrypted files according to a report from Reuters citing Ukrainian cyber police spokeswoman Yulia Kvitko. She confirmed that it was only the ministry

In January 2012, the European Commission set out plans for data protection reform across the European Union in order to make Europe ‘fit for the digital age’. Almost four years later, agreement was reached on what that involved and how

A Japanese business will begin paying its workers partially in bitcoin, in a bid to gain a better understanding of how the digital currency works, Agence France-Presse reports. Tech firm GMO Internet said it will pay up to 100,000 yen

DUBAI (Reuters) – Careem, Uber’s main ride-hailing app rival in the Middle East, was hit by a cyber attack that compromised the data of 14 million users, it said on Monday. The company learned of the breach, in which access

SAN FRANCISCO – Researchers have identified a new iOS vulnerability called “trustjacking,” which exploits a feature called iTunes Wi-Fi Sync to give attackers persistent control over victims’ devices. Symantec researchers presented the vulnerability during a session at RSAC this week

Two advanced persistent threat groups managed to sneak apps onto the Google Play marketplace earlier this year. Both were designed to conduct surveillance on targets located in the Middle East region, according to Lookout security researchers. One of the groups,

Criminals, like carpenters, hate to see a good tool go unused. It’s no surprise, then, that the Mirai botnet has been in action once again, this time in concert with other botnets and with targets in the financial sector. Insikt

The online travel company Orbitz has suffered a major data breach possibly exposing the personal information associated with the owners of up to 880,000 payment cards. The company, a subsidiary of Expedia, said in a statement that the payment card

Endpoint detection and response, usually abbreviated as EDR, has dominated cybersecurity news feeds over the past few weeks. Palo Alto, ESET, CrowdStrike, and Cylance have all announced new endpoint detection and response solutions, made major purchases with such solutions in

Cybercrime ran rampant last year, and the cryptocurrency market was no exception, as evidenced by hacks involving bitcoin ransoms and the pervasive use of cryptojacking. Cryptojacking involves using someone’s CPUs to secretly mine cryptocurrency without that person’s permission. And according

MENA CISO SUMMIT

Security breaches have now become inevitable and the approach of corporates and governments have moved from prevention to resilience. While emerging technologies are becoming double-edged swords, the role of the Chief Information Security officer needs to be established clearly to

A cryptocurrency is a digital or virtual currency designed to work as a medium of exchange. It uses cryptography to secure and verify transactions as well as to control the creation of new units of a particular cryptocurrency. Essentially, cryptocurrencies

Spanish-based international bank Santander confirmed the launch of its Ripple-powered Blockchain payment network Thursday, April 12, becoming the first bank to do so. One Pay FX, which uses Ripple’s Blockchain technology to cut the cost and waiting time associated with