How to spot if your phone has been compromised
Amer Owaida, Security Writer at ESET explains how to spot the signs of a hacked phone and remove the hacker from your phone, if your smartphone has been compromised by malware.Read More…
Amer Owaida, Security Writer at ESET explains how to spot the signs of a hacked phone and remove the hacker from your phone, if your smartphone has been compromised by malware.Read More…
Tony Anscombe, Chief Security Evangelist at ESET talks about the trade-off between using a free service and giving up our personal data becomes much less palatable when we think about the wider ramifications of the collection and use of our personal dataRead More…
Joe Robertson, Director of information security and EMEA CISO at Fortinet discusses the risks associated behind the Internet of ThingsRead More…
Phil Muncaster, guest writer at ESET explains the signs to look for, how account takeover attacks commonly occur, and how to recover your account and avoid falling victim again. Email has been with us for decades. And while social media and mobile messaging apps are increasingly popular, it remains theRead More…
Gerhard Hartman, Vice President, Medium Business for Sage Africa & Middle East shares the key eight benefits that cloud technology offers financial teams and professionalsRead More…
Phil Muncaster, guest writer at ESET checks whether is loyalty fraud on your radar? Here’s why your hard-earned reward points and air miles may be easy pickings for cybercriminals.Read More…
Emad Fahmy, Systems Engineering Manager, Middle East, NETSCOUT, explains how security should extend across supply chain and how to bring greater intelligence to the fight against cyberthreats.Read More…
Anthony Webb, VP International, A10 Networks, explains why cybersecurity is an exciting career option to consider.Read More…
Jacob Chacko, Regional Director – Middle East, Saudi & South Africa at Aruba, a Hewlett Packard Enterprise company, explains why SD-WAN is the super glue that will bring 5G and all the edges together.Read More…
Phil Muncaster, guest writer from ESET explains that as you attempt to strike it rich in the digital gold rush, make sure you know how to recognize various schemes that want to part you from your digital coinsRead More…
Dave Russell, VP, Enterprise Strategy, Veeam, explains the why organizations should implement effective Modern Data Protection strategy that combines effective front-line cybersecurity defences with a comprehensive approach to data backup and disaster recovery to handle cybercrime.Read More…
Krupa Srivatsan, Director of Product Marketing at Infoblox, explains why securing today’s hybrid workplace needs an ecosystem approach.Read More…
Copyright © 2026 - Zarks Media. All rights reserved
Stay ahead of the digital revolution in the Middle East & Africa