Cyber Crime

Cyber Crime

digital identity

0 80
A national digital identity network is to be built in Canada. SecureKey Technologies and a Canadian non-profit coalition have received a grant from a...
cyber

0 66
  The Russian government has long been known to use criminal hackers for its’ world-class hacking abilities and intelligence gathering. The criminal group most likely...
cyber security

0 32
By Or Yaacov,  EMEA Information Security Solutions Architect, F5 The DDoS attack on the OVH hosting company in September 2016, that used breached IoT devices,...
cybersecurity

0 42
The Canadian Institute for Cybersecurity opened at the University of New Brunswick (UNB) recently with more than $4.5 million in funding and the establishment...
cyber security

0 73
  Banks and financial institutions are the most favoured target for cyber criminals. Reports by various internet security firms show that the majority of the...

0 116
Recent Russian cyber attacks against US targets have raised the concern of the US Department of Homeland Security (DHS).  A critical infrastructure may be...

0 67
The version of destructive computer virus Shamoon was being employed to attack computers in Saudi Arabia and other regions in mid-November, as revealed by...

0 36
The US Defense Department announced recently that the Pentagon has approved hackers to test the cybersecurity of its public websites without fear of prosecution....

0 105
Ixia, a provider of network testing, visibility, and security solutions, announced recently that the company’s threat intelligence gateway (ThreatARMOR) will now include cloud-powered centralized...

0 62
Attivo Networks, an award-winning firm in cyber security threat detection, announced recently that it has been named a Platinum Award winner in American Security...

0 66
Germany's cabinet approved a new cyber security strategy due to a growing number of attacks, especially from China and Russia. The strategy calls for the...

0 98
Researching vehicular cybersecurity and its role in future law enforcement was the focus of the first part of a project carried out as a...

0 59
Rostec, the Russian state arms contractor, has launched its own anti-hacking center to deal with attempted cyberespionage attacks, the company’s IT subsidiary RostecInform (RT...

0 258
Virtual criminal activity started as early as the 1970s. In 1984, the first computer forensics program, Magnetic Media, was created by the FBI to...

0 71
By Gad Elkin, Information Security Director in F5 In the film “Ransom”, Mel Gibson plays the role of a father who is trying to save...

0 118
Chinese hackers have recently launched a network attack for targeting people attending a US-Taiwan Defense Industry Conference. The conference was attended by defense officials,...

0 71
Following recent reports of cyber attacks by major international players like China and Russia, the UK has decided to take it’s cyber security abilities...

0 120
CounterTack, the cybersecurity company, recently announced that it’s endpoint detection and response (EDR) security technologies are now available worldwide as a new managed EDR...

0 195
The coordinated cyber attack that crippled parts of the internet on October 21 highlighted key policy problems, a Stanford cybersecurity scholar said. Herbert Lin, a...

0 84
According to recent reports, the Australian government networks are at risk of cyber-attacks. previous incidents include foreign spies had hacking into the Bureau of...

iHLS Events

0 1

0 1

0 482