Expert Speak

Newly launched Apple M1 Macs target for cybercriminals

Amer Owaida, Security writer at ESET explains the disturbing trend that the first instance of malicious code native to Apple Silicon M1 Macs emerged a month after the release of devices equipped with ...

How to develop your calling into a career

Dr. Saliha Afridi, Co-founder and Managing Director, The Lighthouse Arabia highlights that most of the leaders realize money and worldly success didn’t mean much if it was not linked to their calling.

Smaller businesses need employee choice when it comes to end-user devices

Damian Jaume, President, Dynabook Europe GmbH, explains how SME’s can futureproof themselves by making the appropriate device provisioning decisions for the digital age.

Banking and Finance predictions for the year 2021

Miljan Stamenkovic, General Manager of the Middle East and North Africa region at Mambu, shares Mambu’s 2021 banking and finance predictions.

7 ways malware can infect your device

Amer Owaida, security writer at ESET explains that everyone knows that malware is bad, but are they also aware of the various common ways in which it can infiltrate your devices?

Cyber attackers can take full control of iPhone via WiFi

Amer Owaida, security writer at ESET explains that using a zero-click exploit, an attacker could have taken complete control of any iPhone within Wi-Fi range in seconds

Security in uncertain times

Tomáš Foltýn, security writer at ESET looks back at some of the key themes that defined the cybersecurity landscape in the year that’s ending and give their takes on what to expect in 2021.

How Zoom enabled Emiratis during lockdown

Sam Tayan, Managing Director for the Middle East and Africa at Zoom describes how Zoom enabled emiratis in very many different ways during the COVID-19 lockdown

Hackers can trick scientists into producing dangerous substances

Amer Owaida, security writer at ESET sights a recent study describing “an end-to-end cyber-biological attack” explains that without ever setting foot in the lab, a threat actor could dupe ...

Lost Password

Please enter your username or email address. You will receive a link to create a new password via email.