Business Security

Business Security

Large organizations (companies or agencies with more than 200 iOS or Android mobile devices) are almost guaranteed to have at least one malware-infected device,...

We have recently written about the mind staggering fact that the Pentagon still uses floppy disks to perform nuclear missions. This new story is...

Cloud computing has brought about a new age of convenience. You can store massive amounts of data, share it easily, and most technical aspects...

Israel and the United States have recently signed a cyber defense declaration calling for real-time operational connectivity through respective Computer Emergency Response Teams (CERTS)...

Israeli startup firm CTERA Networks has won a tender to provide a private cloud system for file sharing to the US Ministry of Defense....

iHLS has moved into its offices in Ra’anana this week. Such a move is certainly cause for celebration, especially when the new offices are...

North Korea is likely behind another cyber attack on South Korea’s digital infrastructure, United Press International reports. South Korea’s Air Force’s website has been...

British defence manufacturer BAE Systems and Japanese technology giant Fujitsu have announced a partnership to develop and implement a Cyber Threat Intelligence (CTI) sharing...

The defense sector was not one of the first to move to the cloud, but it seems the revolution has reached it too. The...

The US Defence Advanced Research Projects Agency (DARPA) is looking at ways it can utilise blockchain technology - the engine behind the Bitcoin cryptocurrency...

Hacktivist collective Anonymous have found a new target to wage cyber-war on: economic institutions. Anonymous have released a message warning of a series of...

US Steel Corporation, one of the world’s largest producers of steel, has filed a complaint with the US International Trade Commission (ITC) accusing China...

A new global forecast predicts that the market for perimeter intrusion detection systems will grow from its $2.36bn last year to $3.37bn by 2020,...

A new torjan horse malware called USB Thief, which is virtually undetectable before and after penetrating the computer, was detected by ESET. The software...

The US National Security Agency (NSA) has a serious concern: quantum computing. Last year, the NSA warned the general public that encryption algorithms that...

MadSec’s Cyber Intelligence team, which is investigating the cyber operation OpIsrael 2016 against Israel scheduled for April 7th, 2016, reports that the group of...

When the internet first started coming into being, security wasn’t really an issue, not even as an afterthought. This is was more than half...

Over the last few years a new menace has emerged: ransomware. Hackers now routinely take control and hold hostage the computer systems of businesses,...

Carbon nanotubes - is there anything they can’t do? They’re strong, hard, loaded with unique electrical, thermal, and optical properties, and have been heralded...

Personal information theft is one of the greatest risk factors for users online. Malicious websites that install malware designed to steal banking credentials, phishing...

While organizations spend tens of billions of dollars every year to protect themselves from cyber attacks, the disturbing truth is that in most cases,...

Strong Artificial Intelligence is still a long way off, it happens at all. But the worry that keeps creeping up is that once we...

Latest