Mobile phones have evolved considerably over the past two decades from being just simple communication devices to becoming the most innovative compact entertainment systems empowering people to view c...
Nothing seems to be untouched in this age of computing, cyber-threats are even threating the users of smart devices particularly smartphone, which is become prone to hacking and data loss much more th...
Guest-written by: Alexander Rauser, Chief Executive Officer, Prototype Many people believe that the era of technology has changed our mindset in different ways. One of the most commonly asked question...
Guest written by: Bruce Zhou, CEO, AXILSPOT The ability to connect machines, devices, sensors, and other everyday things into an intelligent network and make sense out of them, has huge promise...
Guest written by: Tarek Saadi, Head of Ericsson GCC and Pakistan Connected cars have been available for a number of years, but mainly as new cars in the premium segment. Now, Swedish telecom operator ...
Guest written by: Jeff Clarke, Vice Chairman, Operations and President of Client Solutions, Dell If you could predict the future, how would you do things differently? According to the Digital Business...
Guest written by: ESET For many, Christmas is the most wonderful time of the year – but find oneself a victim of an online attack and the season may turn sour. With spirits and internet usage at an al...
By Kalle Bjorn, Director, Systems Engineering – Middle East, Fortinet Malware and hacking services are becoming commoditized. Ransomware as a service has become popular this year. More effective...
Guest written by James Lyne, Global Head of Security Research, Sophos Instead of creating the traditional ‘top tips to protect yourself from cyber-criminals this Shopping Season’, Sophos has tur...