3rd Annual Cyber Security for Energy & Utilities
GCC’s critical infrastructure is complex and diverse, combining systems in both cyberspace and the physical…
Human Rights and the Internet in Middle East
“The Internet treats censorship as a malfunction and routes around it.” – John Perry Barlow…
Middle East: From Cold War to Cold Cyberwar
Since history is a mirror to the future, we will take a look at “Cold…
Digital Espionage in the Middle East
Kaspersky lab announced the discovery of new sophisticated malware targeting Middle East. The new malware…
Middle East loses control in the Cyber Battlefield
Kaspersky Lab announced the discovery of a highly sophisticated malicious program that is actively being used…
Middle East among Most Malware Infected Nations
Reports by “Panda Security” claim that half of all computers worldwide are infected with malware. Although…
Cybercrime Legislation in the Middle East
ICTs investments in MENA countries are overtaking the rest of the world but they didn’t…
When hackers become terrorists!
Last week Saudi hacker who identified himself as a member of an anonymous network called XP-group has leaked 400.000…
Wikileaks: The Spy Files!
During the last two years I have been talking about Middle East regimes and their…
Computer Worms & Middle East Fukushima
One year since Stuxnet worm discovered online and the seriousness of the situation is still…
3rd Annual Cyber Security for Energy & Utilities
GCC’s critical infrastructure is complex and diverse, combining systems in both cyberspace and the physical…
Human Rights and the Internet in Middle East
“The Internet treats censorship as a malfunction and routes around it.” – John Perry Barlow…
Middle East: From Cold War to Cold Cyberwar
Since history is a mirror to the future, we will take a look at “Cold…
Digital Espionage in the Middle East
Kaspersky lab announced the discovery of new sophisticated malware targeting Middle East. The new malware…
Middle East loses control in the Cyber Battlefield
Kaspersky Lab announced the discovery of a highly sophisticated malicious program that is actively being used…
Middle East among Most Malware Infected Nations
Reports by “Panda Security” claim that half of all computers worldwide are infected with malware. Although…
Cybercrime Legislation in the Middle East
ICTs investments in MENA countries are overtaking the rest of the world but they didn’t…
When hackers become terrorists!
Last week Saudi hacker who identified himself as a member of an anonymous network called XP-group has leaked 400.000…
Wikileaks: The Spy Files!
During the last two years I have been talking about Middle East regimes and their…
Computer Worms & Middle East Fukushima
One year since Stuxnet worm discovered online and the seriousness of the situation is still…