Language

By Aaron White, Regional Director for Sage Middle East

 

From 1 January 2018, any business operating in the Gulf Cooperation Council (GCC) group of nations that earns revenue of Dhs 375,000 or more, will be legally required to register as a value-added tax (VAT) vendor.

By Alastair Paterson, CEO and Co-Founder of Digital Shadows

 

If you’re familiar with mafia movies then you’re familiar with extortion – the practice of obtaining something, especially money, through force or threats. Extortion has been around for centuries – well before “The Godfather” or “Goodfellas.” Even cyber extortion, which extends this criminal activity into the digital world, isn’t new. What is new, however, is the wide variety of methods that are used by the bad guys to get their money.

Monday, 18 September 2017 08:08

Why Instagram Archive Is Your Brand’s Buddy

Written by

By Rasika Thapa, Junior Account Executive, Spread Communications

 

Earlier this year, a study unraveled a staggering number of business profiles set up on Instagram – 15 million. In March 2017 alone, over 120 million Instagram users visited a linked business website, called, emailed or sent a direct message to a brand profile on the app.

By Dr. Vaqas Farooqi, Consultant of Physical Medicine and Rehabilitation at Amana Healthcare, Abu Dhabi.

 

According to the World Health Organization, between 250,000 and 500,000 people suffer a spinal cord injury (SCI) around the world, every year.

By Rick Holland, VP Strategy at Digital Shadows

 

What we know about the Equifax breach

By Alastair Paterson, CEO and Co-Founder, Digital Shadows

 

I’ll venture to guess you’re using a mobile device to read this. In a recent Ericsson Mobility Report, the total number of mobile subscriptions at the end of 2016 was approximately 7.5 billion and growing around 4 percent year-on-year.  Greater speed, power and storage capabilities of mobile devices means they are used more frequently for activities previously reserved for laptops or PCs.

By Aaron White, Regional Director for Sage Middle East

 

On 1 January 2018, value-added tax (VAT) will come into effect for the first time in United Arab Emirates. Naturally, small businesses are concerned about the financial and operational impacts of VAT compliance, especially since they’re used to operating in a low-tax business environment.

By Rick Holland, VP Strategy at Digital Shadows

 

Exploit kit activity is waning. Collectively these malware distribution tools used to be a prominent method of infection. They rely on compromised websites, malicious adverts and social engineering to direct web traffic to their landing pages and attempt the exploitation of vulnerable software. Operated by various actors and groups, exploit kits possess different features, use various exploits and distribute different malware to victims. Since June 2016 at least four of the major players in this area ceased to be active. In this blog, I wanted to explore which exploit kits are still around and propose some plausible scenarios for the future of the exploit kit landscape.

By Brian Gammage, Chief Market Technologist for End-User Computing at VMware

 

The Middle East’s shift to digital business has created a dilemma for the regions CIOs. They need to innovate and implement change, while also retaining levels of control and management.

By Matthew Gardiner, Senior Product Marketing Manager, Mimecast

 

Most people live under the assumption that email is immutable once delivered, like a physical letter.  A new email exploit, dubbed ROPEMAKER by Mimecast’s research team, turns that assumption on its head, undermining the security and non-repudiation of email; even for those that use SMIME or PGP for signing.  Using the ROPEMAKER exploit a malicious actor can change the displayed content in an email at will. For example, a malicious actor could swap a benign URL with a malicious one in an email already delivered to your inbox, turn simple text into a malicious URL, or edit any text in the body of an email whenever they want. All of this can be done without direct access to the inbox.

Page 1 of 4