Cyber Crime

Cyber Crime

84
Germany's cabinet approved a new cyber security strategy due to a growing number of attacks, especially from China and Russia. The strategy calls for the...

143
Researching vehicular cybersecurity and its role in future law enforcement was the focus of the first part of a project carried out as a...

78
Rostec, the Russian state arms contractor, has launched its own anti-hacking center to deal with attempted cyberespionage attacks, the company’s IT subsidiary RostecInform (RT...

284
Virtual criminal activity started as early as the 1970s. In 1984, the first computer forensics program, Magnetic Media, was created by the FBI to...

92
By Gad Elkin, Information Security Director in F5 In the film “Ransom”, Mel Gibson plays the role of a father who is trying to save...

164
Chinese hackers have recently launched a network attack for targeting people attending a US-Taiwan Defense Industry Conference. The conference was attended by defense officials,...

91
Following recent reports of cyber attacks by major international players like China and Russia, the UK has decided to take it’s cyber security abilities...

136
CounterTack, the cybersecurity company, recently announced that it’s endpoint detection and response (EDR) security technologies are now available worldwide as a new managed EDR...

215
The coordinated cyber attack that crippled parts of the internet on October 21 highlighted key policy problems, a Stanford cybersecurity scholar said. Herbert Lin, a...

95
According to recent reports, the Australian government networks are at risk of cyber-attacks. previous incidents include foreign spies had hacking into the Bureau of...

56
A major cyber-attack that used hacked smart devices such as web cameras managed to shut down high-profile websites including Twitter, Spotify and PayPal, as...

62
The University of Connecticut’s (UConn) School of Engineering and Synchrony Financial, a consumer financial services company headquartered in the state, have announced earlier this...

34
Secretary of the National Security and Defense Council of Ukraine, Oleksandr Turchynov discussed at a meeting with the Romanian Minister of National Defense, Mihnea...

35
Cloud service providers of US Federal agencies and government organizations must meets strict standards and requirements in order to achieve a trusted provider status. CloudPassage...

49
An IT expert points out at various cyber security threats in the shipping field. Frank Coles, the CEO of Transas, a developer and supplier...

51
DCI, a large French company that specializes in military training, consulting and technical assistance, recently completed a one-week training course to teach 12 trainees...

55
Efforts to combat hackers usually focus on one method of attack, but computer scientists at University of Texas Dallas have developed a strategy more...

36
Awareness of cyber attacks in the run-up to the U.S. presidential election helped grow the number of young adults more likely to pursue a...

60
  The Internet of Things (IoT) is an innovative field developing rapidly. In daily life it is about connecting computers and various smart devices such...

87
Metova Inc announced the launch of Metova Solutions, a provider of Military-grade cybersecurity technologies, training and hardware for corporations and institutions. Metova Solutions technology...

101
Security researchers have come across the source code for the Internet of Things botnet called Mirai. This botnet has been used to launch major...

89
Britain's GCHQ security agency is considering developing a nationwide internet firewall to block malicious content and protect government networks from rocketing numbers of attacks,...

iHLS Events