Intelligence

Intelligence

The first two minutes of a cyberattack are crucial - that's when the attacker sets up camp and downloads additional malware to dig in...

A top secret intelligence budget justification leaked by former NSA contractor Edward Snowden depicts a U.S. Intelligence Community (IC) awash in unprecedented amounts of...

National Security Agency officers on several occasions have channeled their agency’s enormous eavesdropping power to spy on love interests, U.S. officials said. The practice isn’t...

The attack vector NetTraveler (a.k.a Netfie, Travnet or Red Star APT), has been detected again. This is a new, advanced threat that has already...

Russia has stepped up its intelligence effort, aimed at getting data on any Israeli action related to Syria. Sources told i-HLS that this effort...

"It'll get worse before it gets better," mobile industry expert Chetan Sharma told NBC News. "Unless leaders step up and work on a framework...

The U.S. National Reconnaissance Office (NRO) is trying to wean itself from reliance on a satellite communications system run by NASA, according to excerpts...

The U.S. National Security Agency has reportedly cracked the encryption used by the video teleconferencing system at the United Nations headquarters in New York...

The unmanned aerial vehicle (UAV) base on the Iranian island of Qeshm has undergone significant development in recent years, as revealed by DigitalGlobe satellite...

In the next few weeks an unlikely government agency known more for weather than regulating satellites, the National Oceanic and Atmospheric Agency (NOAA), may...

When American firm Silent Circle shut down its Silent Mail encrypted-email service earlier this month, it claimed that "e-mail as we know it today...

Europe's high-speed rail network is at risk of being attacked by al Qaeda, according to a German newspaper. Bild, citing intelligence sources, said the extremist...

A prominent legal news site, well known and respected for explaining the ins and outs of technology-related law, is shutting down over its founder's...

If you want to make it as a tech entrepreneur, enlist in the Israeli Defense Force and aim for Unit 8200. Unit 8200 runs Israel's...

American power plants and utility companies face a growing cyber vulnerability. No U.S. power plant has so far suffered a significant cyberattack, but experts...

The leaked information about the operations of the N.S.A. in the U.S. have foiled a huge Cyber defense plan. Even while rapidly expanding its electronic...

The Department of Homeland Security just awarded contracts to 17 vendors for tools and services to continuously monitor federal systems and networks for cyber...

Real science is quickly catching up to science fiction, especially when it comes to the latest amazing advances in miniaturization. Some time ago a new...

The European Union is pondering an EU Commission proposal to acquire a fleet of surveillance drones, satellites, and planes as part of an “ambitious...

Often seen as inflexible, slow and failing to deliver on the promise of Security Information and Event Management (SIEM), the traditional SIEMs of yesterday...

 China has recently been accused of intense spying activity in cyberspace, following claims that the country uses cyber tactics to gain access to military...

By Amir Averbuch and Gabi Siboni INSS – CYBER Warfare Program   The classic defense methods employed throughout the world in recent decades are proving unsuccessful in halting modern...

Latest