Technology’s answer to e-crime

0
Cyber crime, aka e-Crime, presents a highly complex and sophisticated threat that has been evolving rapidly recently. The unfolding legitimate cyber world makes for...

Innovative Face Recognition technology

0
In this day and age of highly advanced crimes on the one hand, and intensifying terrorism on the other, the sense among intelligence service,...

Israel’s Air Force unveils new intelligence system

0
New data collecting system for the Israeli Air Force: The variety of unmanned air systems (UAS) over Israel and neighboring areas has created a...

DHS to rely on big data to protect critical infrastructure, networks

0
DHS officials responsible for protecting federal civilian networks and critical industries from cyberattacks have recently referred to this issue. They said they are going...

Equation Group: The Crown Creator of Cyber-Espionage

0
Kaspersky Lab discovers the ancestor of Stuxnet and Flame – powerful threat actor with an absolute dominance in terms of cyber-tools and techniques. For several...

Most cars are vulnerable to hacking or privacy intrusions

0
All a hacker needs to be able to break into your car is an iPad. This, according to a report which was recently released...

Obama’s $14 billion cybersecurity initiatives for the 2016 budget

0
American companies welcome next year's budget for Cyber security. Massachusetts cyber security firms applauded President Barack Obama proposed $14 billion allocation toward cybersecurity initiatives...

“Internet of Things” – an end to privacy?

0
Experts caution against the so-called digital electronic “Internet of Things” (IoT). Along with “Smart Grid Technologies” it "could fully eviscerate privacy". Does technological innovation...

Big data 4 HLS Conference

0
Top experts from Israel and abroad met today in the Israel Air Force Center in Herzliya for the Big Data 4 HLS Conference, organized...

Israeli system intercepts cloud-stored data

0
Nowadays, everything is available at the palm of our hand. Nevertheless, these amazing capabilities, combined with our instinctive fear of the "Big Sister Syndrome"...

iHLS TV Weekly Video Report – February 3rd 2015

0
Register to iHLS Israel Homeland Security In this weekly Video report (February 3rd 2015): Coalition against Isis: Too Little Too Late Kaspersky Technology Forecast for 2045 The US...

Cyber attacks on drones

0
The number of missions unmanned systems are tasked with, as well as their diversity, is expanding each year. The roles they play include a...

A single DDoS attack can cost a company more than $400,000

0
According to the results of a study conducted by Kaspersky Lab and B2B International, a DDoS (Distributed Denial of Service) attack on a company’s...

China hacked U.S classified systems and stole F-35 data

0
China obtained more than 50 terabytes of data from U.S. defense and government networks, notably the Joint Strike Fighter’s stealth F-35 radar and engine...

A Multidisciplinary Analysis of Cyber Information Sharing

0
The emergence of the cyber threat phenomenon is forcing organizations to change the way they think about security. One of these changes relates to...

Secured Robotic vehicle – the future is here

0
Secured robots are becoming more commonplace in the framework of military service, as well as other forces, including HLS. Being able to send out...

Israel: Doubts Concerning the Performance of the National Cyber Bureau

0
The public uproar over the establishment of the National Cyber Bureau is far from subsiding. Following the request made by security, legal and technology...

Cyber: Endpoint Protection Platforms

0
Kaspersky Lab improved its position as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms. Kaspersky Lab has been named a “Leader” in the...

Safe City meets Big Data on the corner of Video Analytics

0
With the advent of technological development and the significant reduction in the cost of video end user devices, one would be hard pressed to...

2014: Greater awareness of security breaches

0
2014 will be seen as the “Year of the Breach,” or at the least, the “Year of Raised Awareness of Breaches,” according to observers...

Kaspersky Lab: Half of companies underestimate DDoS

0
Half of Companies Put Themselves at Risk by Undervaluing DDoS Countermeasures According to the research carried out by Kaspersky Lab and B2B International, only 50%...

New strategic project to implement cyber security platform for advanced applications

0
A new joint collaboration with CELARE, cyber security subsidiary of the BATM Advanced Communications, to implement cyber security platform for large enterprises based on...

Latest

Image provided by pixabay

Data Breaches Are Connected to Mass Layoffs, Research

0
A research team from Binghamton University and the State University of New York explains the connection between mass layoffs and data breaches, theorizing that...