Business Security

Business Security

Russian president's official website was targeted by a massive hacker attack during country-wide local elections, but the Kremlin's cyber defenses managed to cope with...

Most of us have already heard about ways of defending against possible cyber attacks: Don't open e-mails from people you don't know, choose a...

In light of numerous cyber attacks and security breaches, of which the attack on the American Office of Personnel Management (OPM) was perhaps the...

The United States has had to deal with a series of embarassing cyber attack in the past few months, chief among them is the...

Security leaks have reached an all-time high these days, and are causing great concern among financial advisors, business owners and consumers. Nowadays there are...

Natural disasters may cause loss of information existing in the computer systems, leading to businesses and infrastructure collapsing. Proper planning for recovery after natural...

Biometric identification means have been around for some time now, helping commercial companies to keep their information secure and their offices compartmentalized. Being an...

Canadian company Nymi has managed to develop a unique, first of its kind, technological solution: Paying with a wrist-bracelet that can detect the heartbeat...

In the past, wars took place only in the real world: Armies battled each other in the physical spaces while using guns, cannons set...

A group of hackers, supposedly originating in China, has comitted a cyber attack and managed to break into the American Airlines computer system, as...

Maxim Rupp, a information security researcher for the german company Cure53, has managed to penetrate the bimetric security of the Taiwanese company Chiuy Technology....

Researchers from the College of Computing at the Georgia Institute of Technology were awarded $4.2 million from the Defense Advanced Research Projects Agency (DARPA)...

The Internet of Things (IoT) trend is becoming more central in our lives and surrounds us everywhere. In everyday life this means the smart...

Researchers from the  Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies...

Rostec’s Security Technologies and ST Electronics from Singapore have signed a memorandum of understanding for cooperation in surveillance, integrated systems for security management, creation...

Seven teams from around the country have earned the right to play in the final competition of DARPA’s Cyber Grand Challenge (CGC), a first-of-its-kind tournament...

Let us do a little experiment: Try to close your eyes and think of the number of people you know that don’t have an...

By Rachel Ehrenfeld Shutting down the background check system of the Office of Personnel Management employees will do little to prevent the abuse of millions...
video

Future Forces For HLS Future Forces 4 HLS   The upcoming conference for the HLS Future Forces is to be held on July 21st, bringing with...

The IBM annual security survey for 2014 reveals that in that year the number of security related events that turned into full cyber attacks...

Google announces the formation of Sidewalk Labs, whose goal is finding technological solutions to issues rising in urban living such as living expenses, transportation...

Following reports on Israel’s involvment in planting a spy software in the hotels where the nuclear talks took place, I-HLS was given the professional...