Image by Unsplash

3.3 Million Email Servers at Risk: Lack of Encryption Puts User...

0
A new security report from the Shadowserver Foundation has highlighted a major vulnerability in global email infrastructure, revealing that roughly 3.3 million email servers...

Countries In The Virtual Battlefield

0
In the past, wars took place only in the real world: Armies battled each other in the physical spaces while using guns, cannons set...

Elbit acquires NICE Systems Cyber and Intelligence division

0
Elbit Systems Ltd. announced today that it has signed an agreement to acquire  NICE Systems Cyber and Intelligence division for a total amount of...

Microsoft Admits: Windows 10 Spying Cannot Be Stopped

0
 Windows 10 constantly calls home - a lot. Back in August, Ars Technica reported on a list of features in Microsoft Windows 10 that...
cyber

Public Sector Trying to Defend Itself in Cyber Environment

0
Distributed Denial of Service (DDoS) cyber attacks are a serious problem threatening companies and organizations across the globe. While weaponized data attacks on the...

U.S. Considers Sanctions On Russia And China

0
The United States has had to deal with a series of embarassing cyber attack in the past few months, chief among them is the...

New Micro Chip Security Solution

0
With the outsourcing of microchip design and fabrication a worldwide, $350 billion business, bad actors along the supply chain have many opportunities to install...

INTERPOL 2015 – Israeli innovation, unique solutions and operational experience

0
  Gil Reider, Director of Life Science, Aerospace Defense & HLS Department in the Israel Export and International Cooperation Institute: "The Israel Export and International Cooperation...

Are computers Really Safe From Cyber Attacks?

0
Most of us have already heard about ways of defending against possible cyber attacks: Don't open e-mails from people you don't know, choose a...
image provided by pixabay

New Dangerous Cyberattacks Target AI Systems

0
A new report by Computer scientists from the National Institute of Standards and Technology presents new kinds of cyberattacks that can “poison” AI systems. AI...

Quantum Computers Makes The NSA Worried

0
The US National Security Agency (NSA) has a serious concern: quantum computing. Last year, the NSA warned the general public that encryption algorithms that...

iHLS Moved Its Offices to State-Of-the-Art Complex In Ra’anana

0
iHLS has moved into its offices in Ra’anana this week. Such a move is certainly cause for celebration, especially when the new offices are...

Communicating under water – a revolutionary Israeli development

0
Dolphins communicate under water using sound waves that travel great distances. Now, human beings can also communicate under water, using a small device, attached...

6 Things Keeping Cybersecurity Experts Awake At Night

0
Last month, some of the world’s foremost experts on cybersecurity gathered in Lille, France for the International Forum on Cybersecurity, as well as politicians,...
image provided by pixabay

Deep Fakes and Identity Decentralization

0
The growing trend of AI-generated content and deep fakes is making us lose our trust in the internet. Can identity decentralization be the solution?...

The Russian security market creates joint ventures

0
Rostec’s Security Technologies and ST Electronics from Singapore have signed a memorandum of understanding for cooperation in surveillance, integrated systems for security management, creation...
Image by Unsplash

Cybercriminals Use Fake Google Ads to Steal User Credentials

0
Cybercriminals have been running a sophisticated phishing campaign using fake Google Ads to steal user credentials, researchers from Malwarebytes Labs have uncovered. These malicious...
K5 Autonomous Security Robot, Photo: Business Wire

Autonomous Security Robot Joins a California Company

0
One of the S&P 500 companies in Southern California has welcomed a new employee - a robot that will be patrolling and securing an...
Image by Unsplash

Ghost Tap: A New NFC-Based Fraud Tactic Gaining Traction

0
In recent years, payment using NFC one's phone has become increasingly common, as it is a method both safer and more convenient than carrying...

#OpIsrael2016: ISIS-Supporting Hackers To Attack Israel

0
MadSec’s Cyber Intelligence team, which is investigating the cyber operation OpIsrael 2016 against Israel scheduled for April 7th, 2016, reports that the group of...

N Korea (Probably) Behind Cyber Attacks On SKAF

0
North Korea is likely behind another cyber attack on South Korea’s digital infrastructure, United Press International reports. South Korea’s Air Force’s website has been...

US Air Force Loses Investigation Database

0
We have recently written about the mind staggering fact that the Pentagon still uses floppy disks to perform nuclear missions. This new story is...

Latest

Gmail Data Leak: 183 Million Reasons to Rethink Your Password Security

0
A new trove of stolen login credentials has surfaced online, with 183 million email addresses and passwords added to the “Have I Been Pwned”...