Cyber Crime

Cyber Crime

76
Department of Homeland Security (DHS) is offering more protections to help states secure voting systems during the November elections. DHS has recently stepped up...

111
It's no news that today institutes from all sectors, international banks to hospitals, are seeking for a complete cyber defense layer. Cyber DriveWare, which...

150
Many of today’s automobiles leave the factory with secret passengers: prototype software features that are disabled but can be unlocked by clever drivers. In what...
video

296
Researchers from the Ben-Gurion University of the Negev (BGU) have demonstrated that an unmodified USB connected to a computer with malicious code can be...

159
A mission form the Israeli Public Security Ministry recently visited  an emergency center in the US in order to learn more about methods to...

118
Until not long ago China was reluctant to open to the developments in the Internet shpere. However, in recent years this country has been...

256
At the recent Black Hat hacker conference in Las Vegas, cybersecurity researchers showed how drones can help secure wireless networks and bulster cybersecurity. David Latimer,...

175
Ransomware attack is one of the scenarios that security experts have been worrying about regarding the widening use of the Internet of Things. It...

185
The web has many advantages for everyone, in every age, around the globe. But as always there are darker sides that can cause severe...

151
Bastille cybersecurity company unveiled a massive vulnerability affecting the vast majority of low-cost wireless keyboards. Using a new attack that Bastille has named “KeySniffer,”...

274
Before they’ve even started, the Rio Olympics are already plagued with numerous issues jeopardising the security of visitors, players, and residents alike. From the...

140
Large organizations (companies or agencies with more than 200 iOS or Android mobile devices) are almost guaranteed to have at least one malware-infected device,...

197
A US House of Representatives committee has voted to create a new agency under the purview of the Department of Homeland Security (DHS) that...

92
The Obama administration is seeking to expand the investigatory powers given to the FBI and amend surveillance legislation to give the Bureau explicit authority...

73
The US Department of Defence (DoD) is bringing some foresight to the threat of information leakers and traitors. The DoD is building “a massive...

157
A  simple Web search can reveal information from thousands of unsecured devices. Even the casual browser can access camera data from Sweden, video game...

310
A vulnerability in cellular communication systems demonstrated in 2014 is still unpatched, allowing hackers to track your location, read your SMS messages, and record...

400
The FBI now has the powers to hack computers anywhere around the world, the Intercept reports. The US Supreme Court approved changes to regulations...

289
Hacktivist collective Anonymous have found a new target to wage cyber-war on: economic institutions. Anonymous have released a message warning of a series of...

233
Satellite expert Roger McKinley warns that “we've become overdependent” on GPS, in an interview with Vox. The former president of the Royal Institute of...

188
China’s twenty-five technology companies have pledged to counter online terror activities. Chinese search engine Baidu, Tencent investment holding company, Alibaba and JD.com - e-commerce companies,...

362
MadSec’s Cyber Intelligence team, which is investigating the cyber operation OpIsrael 2016 against Israel scheduled for April 7th, 2016, reports that the group of...

iHLS Events