Author: Aryeh Danon, Data Security Department Manager at Abnet Communications, distributing Sophos solutions in Israel.
Hackers have discovered a new way to take advantage...
Manual authentication in airports means that passengers need to present different forms of ID such as boarding cards, booking reference numbers as well as...
Cybersecurity is an ongoing concern for many, especially with the proliferation of Internet of Things (IoT) technologies. The importance of securing IoT is increasingly...
In 2017, there were about 20 billion connected devices worldwide, according to Statista, which projects that the number will be more than 75 billion...
By Ilan Segelman, Power Communication (distributing Sophos solutions in Israel)
Revealing private and secret information to unauthorized sources is an ever headline-grabbing issue. The Authority for...
Once again, the retail giant Wal-Mart is using blockchain in order to increase effectivity and security. After it was awarded patents for a crypto-powered...
Cyberattacks and the methods by which the public and private sectors deter and counter them have occupied the headlines with increasing frequency in today’s...
Protecting against phishing attacks, in which malicious actors attempt to gain access to a user’s credentials (and then to systems and networks) through social...
A recent research report from Accenture demonstrates that 86 percent of aerospace and defense companies (A&D) expect to integrate blockchain technology into their corporate...
China has been developing voice recognition technology for identification and surveillance purposes after it already turned face recognition into a constantly used technology. In...
With the increasing automation and widespread use of unmanned aerial systems, potential cyber-attacks on aerial fleets are already a major concern. A recent collaboration...
By Dorit Guterman, Ledico Security Systems, Tomer Nuri, Team
Information and cyber security events can occur also via security cameras and other IoT devices. As result,...
Blockchain technology has recently caught the world's attention because of the central role it plays in enabling cryptocurrencies. It enables secure information transmission on...
New study from Nanyang Technological University, Singapore (NTU Singapore) has found a new security breach that hackers could use to guess your phone's PIN...
Ransomware attacks have become more and more common, attracting more global focus. Rob Wainright the head of the Europol, the European Union Agency for...
The Internet of Things (IoT) ecosystem includes a broad variety of devices and device-systems such as power plants, vehicles, home appliances, etc. Its global...
Due to the rise of mobile transactions, passwords are not sufficiently secure as a means of authentication, and additional modes are required for next-generation...