Posts From Shah Sheikh

BOSTON (Reuters) – Apple Inc. customers were targeted by hackers over the weekend in the first campaign against Macintosh computers using a pernicious type of software known as ransomware, researchers with Palo Alto Networks Inc. told Reuters on Sunday. Ransomware, one

Could you invent an autonomous hacking system that could find and fix vulnerabilities in computer systems before criminals could exploit them, and without any human being involved? That’s the challenge faced by seven teams competing in Darpa’s Cyber Grand Challenge

Gain experienced insights from the biggest names in information security in the Middle East.

ISNR 2016 will be largest and most comprehensive in 7 years. Register today to visit the authoritative international platform in security and resilience.

Visit the leading exhibition to help you find the best in technology to keep your IT systems secure.

The go-to place for everything that is latest in the world of security technology.

Studying and planning safeguards for essential services in the MENA region.

Here’s what systems administrators and others in IT will love (and hate) about Microsoft’s Windows 10 patch and upgrade strategy. “Windows 10 isn’t for all of us, but for each of us.” That’s the tagline Microsoft is using to convey

Why Encryption …? In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption doesn’t prevent hacking but it reduces the likelihood that the hacker will be able

On December 22nd, 2014 Mr. Joseph Gross retained the assistance of Dr. Ashley Podhradsky, Dr. Matt Miller, and Mr. Josh Stroschein to provide the testimony as the expert in the process against pedo’s on Tor. The suspects are accused in

Researchers at ESET analyzed the Dino malware confirming that the sophisticated espionage platform belongs to the arsenal of the Animal Farm APT. Security experts at ESET have analyzed Dino, a sophisticated platform used by the Animal Farm ATP group. Earlier

New Ponemon Report reveals just how hot healthcare data is for hackers. Cybercriminals and nation-state actors are indeed targeting healthcare organizations for their valuable data: cyberattacks and physical criminal activity now have officially surpassed insider negligence as the main cause

Breaking the enigma of InfoSec into smaller bites is a proven method for building up an organization’s security capabilities. Here are six steps to get you started. After many years as a niche profession, security has recently emerged as a

After the 2014 conference that drew record attendance, the conference is back for its 6th iteration.