SecurityITP net home pagehttp://www.itp.net/www.itp.netITP.net.comHackers can tap USB devices in new attacks, researcher warnsKarsten Nohl to describe attack method at Black Hat hacking conference in Las Vegas next week<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Thu, 31 Jul 2014 12:54:03 +0400http://www.itp.net/599222-hackers-can-tap-usb-devices-in-new-attacks-researcher-warnsRussia asks SAP, Apple for source codeCommunications Ministry wary over Edward Snowden revelations, report says<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Thu, 31 Jul 2014 11:07:55 +0400http://www.itp.net/599219-russia-asks-sap-apple-for-source-codeHilton to replace hotel room key with mobile phoneHotel group to begin rolling out technology to streamline check-in and check-out process<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Thu, 31 Jul 2014 08:37:29 +0400http://www.itp.net/599216-hilton-to-replace-hotel-room-key-with-mobile-phoneInternet of Things devices riddled with vulnerabilities: HPTests of 10 most popular IoT products show weak security<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Wed, 30 Jul 2014 15:24:02 +0400http://www.itp.net/599206-internet-of-things-devices-riddled-with-vulnerabilities-hpBug in Android could allow access to personal dataFake ID vulnerability allows hackers to pass off malware as trusted apps<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Wed, 30 Jul 2014 11:59:00 +0400http://www.itp.net/599199-bug-in-android-could-allow-access-to-personal-dataKerzner rolls out Ramco HCM solutionRamco HCM on Cloud to help hospitality group to manage staff, position for growth<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Sun, 27 Jul 2014 15:41:03 +0400http://www.itp.net/599190-kerzner-rolls-out-ramco-hcm-solutionNetwork time protocol: The latest weaponThe evolution of NTP in DDoS attacks has established a new ‘normal’ as 100 Gbps attacks have become common.<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Thu, 24 Jul 2014 13:58:00 +0400http://www.itp.net/599157-network-time-protocol-the-latest-weapon‘Secure’ 2FA has more holes than Swiss cheese: Trend Micro Cybersec firm identifies malware gang exploiting Android vulnerabilities to spoof live two-factor credentials<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Thu, 24 Jul 2014 13:13:07 +0400http://www.itp.net/599172-secure-2fa-has-more-holes-than-swiss-cheese-trend-microSecurity in the data centreData centres are evolving to support changing business models and competitive environments.<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Wed, 23 Jul 2014 15:30:52 +0400http://www.itp.net/599162-security-in-the-data-centreHow to combine your cloudsHow can a hybrid cloud be created, and do Middle Eastern enterprises have the skills to do it? <br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Wed, 23 Jul 2014 15:27:00 +0400http://www.itp.net/599159-how-to-combine-your-cloudsOracle launches Data-as-a-Service solutions for marketing, socialOfferings designed for business insights from array of anonymous user data<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Wed, 23 Jul 2014 13:45:20 +0400http://www.itp.net/599154-oracle-launches-data-as-a-service-solutions-for-marketing-socialUndocumented backdoors found in Apple's iOSForensic scientist details surveillance tools that could be used by law enforcement on iPhone<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Tue, 22 Jul 2014 10:50:56 +0400http://www.itp.net/599134-undocumented-backdoors-found-in-apples-iosSkills a barrier to hybrid cloud adoption: IDCLack of skills impacting Middle East hybrid cloud adoption, says IDC<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Mon, 21 Jul 2014 16:27:36 +0400http://www.itp.net/599129-skills-a-barrier-to-hybrid-cloud-adoption-idcGartner cites escalating attacks, state spying as key cybersec concernsResearch firm gears up for Dubai-based risk management summit<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Mon, 21 Jul 2014 10:48:24 +0400http://www.itp.net/599113-gartner-cites-escalating-attacks-state-spying-as-key-cybersec-concernsFortinet announces improvements for AWSCompany deliver on-demand, pay-as-you-go virtual web application firewalls (WAFs) for Amazon Web Services (AWS)<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Sun, 20 Jul 2014 14:01:27 +0400http://www.itp.net/599108-fortinet-announces-improvements-for-awsDevelop secure comms software, Snowden tells hackersNSA whistle-blower urges HOPE summit delegates to create anti-eavesdropping tools for citizens<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Sun, 20 Jul 2014 11:50:35 +0400http://www.itp.net/599102-develop-secure-comms-software-snowden-tells-hackersOrganisations using outdated access controlsSurvey by HID Global shows companies not using up-to-date access controls or enforcing policies<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Sat, 19 Jul 2014 15:20:38 +0400http://www.itp.net/599098-organisations-using-outdated-access-controlsMicrosoft's Bing launches 'right to be forgotten' formSearch engine follows in Google's footsteps after court ruling in May<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Thu, 17 Jul 2014 17:38:08 +0400http://www.itp.net/599097-microsofts-bing-launches-right-to-be-forgotten-formManageEngine releases API for EventLog Analyzer Aimed at feeding third-party solutions with normalised data from SIEM log<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Thu, 17 Jul 2014 11:03:09 +0400http://www.itp.net/599086-manageengine-releases-api-for-eventlog-analyzerDetecting the details in dataIT forensics is gaining more attention from organisations in the region<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Thu, 17 Jul 2014 08:40:00 +0400http://www.itp.net/599025-detecting-the-details-in-dataBoooooo! Top 10 malware superheroesITP.net presents McAfee's danger list of heroes doing cyber villains' dirty work<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Wed, 16 Jul 2014 16:30:31 +0400http://www.itp.net/599078-boooooo-top-10-malware-superheroes?tab=photosArbor reports ‘greatest number of volumetric DDoS attacks ever’ in H1 2014Over 100 attacks reported where attack volumes exceeded 100GB per second<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Wed, 16 Jul 2014 13:34:44 +0400http://www.itp.net/599074-arbor-reports-greatest-number-of-volumetric-ddos-attacks-ever-in-h1-2014Dimension Data targets 1m Lync voice seats by 2017Microsoft Lync aims to reduce business costs by offering video and telephone conferencing services<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Wed, 16 Jul 2014 12:21:23 +0400http://www.itp.net/599070-dimension-data-targets-1m-lync-voice-seats-by-2017Saudi CITC blocks attacks on 'sensitive' websitesNine attacks on government and commercial agencies blocked by CITC last year, six govt sites hacked<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Mon, 14 Jul 2014 15:28:08 +0400http://www.itp.net/599039-saudi-citc-blocks-attacks-on-sensitive-websitesSummer months ring in new security threatsUsers need to take extra precautions while planning holidays, advises Help AG<br /><a href="http://ad.doubleclick.net/jump/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" target="_blank"><img src="http://ad.doubleclick.net/ad/itp_net_en/rss-feed;sz=120x60;tile=1;ord=1256562199?" width="120" height="60" border="0" alt=""></a>Mon, 14 Jul 2014 10:09:51 +0400http://www.itp.net/599031-summer-months-ring-in-new-security-threats