A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according to a report from...
Kaspersky Lab reveals latest cyberespionage tactics: complexity and modularity VS functionality.
Nation-state sponsored cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex,...
North Korea is targeting infrastructure in the west by Cyber attacks.
According to various reports, North Korea has a team of roughly 3,000 cyber soldiers....
Have we completely given up on privacy?
When it comes to wireless charging, aka wireless power, the answer is probably ’yes’.
Though they have become indispensable...
The country’s air traffic control systems are vulnerable to hackers. This, according to a 42-page document entitled "Information Security: FAA Needs to Address Weaknesses...
We are all understandably ’hysterical’ about maintaining our privacy. There is no doubt this is a burning, crucial issue. Nevertheless, we ought to bear...
U.S DHS launches $25K prize for innovative ways to track first responders indoors during incidents.
The Homeland Security Department's research and development arm announced it...
Kaspersky Lab discovers the ancestor of Stuxnet and Flame – powerful threat actor with an absolute dominance in terms of cyber-tools and techniques.
For several...
Nowadays, everything is available at the palm of our hand. Nevertheless, these amazing capabilities, combined with our instinctive fear of the "Big Sister Syndrome"...
Register to iHLS Israel Homeland Security
In this weekly Video report (February 3rd 2015):
Coalition against Isis: Too Little Too Late
Kaspersky Technology Forecast for 2045
The US...
The U.S. is realizing step by step to what degree it is vulnerable to Cyber attacks.
According to HomeLand Security News Wire, while most cybersecurity...
Human-controlled robotic systems anywhere in the world and even in space constitute the solution to various logistic and other barriers to human presence.
Dr. Andre...
Yoram Hacohen
Three interesting processes are underway as a direct result of Edward Snowden’s revelations about the extent of the access by US security services...
2015 will see an increase in Cyber Warfare incidents.
McAfee Labs' 2015 Threats Predictions report sees increased cyber-warfare and espionage, along with new strategies from...
Analysis of Firsthand Experiences of the World’s Most Renowned Cybersecurity Forensics Teams Pinpoints Exploitation of Privileged Accounts as a “Signature” in Targeted Attacks.
A new...
In a recent C-SPAN interview by Mary Jordon from the Washington Post, Dr. Arati Prabhakar, director of the Defense Advanced Research Projects Agency (DARPA), conducted stated:...
This problem is getting more serious - the inadequacy of current network security systems, which require expert programmers to identify and repair system weaknesses...
Due to expanding cyber-attack vectors on the energy grid and the significant growth in popularity of electric vehicles (EV’s), Nation-E, a provider of energy...