3.3 Million Email Servers at Risk: Lack of Encryption Puts User...
                A new security report from the Shadowserver Foundation has highlighted a major vulnerability in global email infrastructure, revealing that roughly 3.3 million email servers...            
            
        Countries In The Virtual Battlefield
                In the past, wars took place only in the real world: Armies battled each other in the physical spaces while using guns, cannons set...            
            
        Elbit acquires NICE Systems Cyber and Intelligence division
                Elbit Systems Ltd. announced today that it has signed an agreement to acquire  NICE Systems Cyber and Intelligence division for a total amount of...            
            
        Microsoft Admits: Windows 10 Spying Cannot Be Stopped
                 Windows 10 constantly calls home - a lot. Back in August, Ars Technica reported on a list of features in Microsoft Windows 10 that...            
            
        Public Sector Trying to Defend Itself in Cyber Environment
                Distributed Denial of Service (DDoS) cyber attacks are a serious problem threatening companies and organizations across the globe. While weaponized data attacks on the...            
            
        U.S. Considers Sanctions On Russia And China
                The United States has had to deal with a series of embarassing cyber attack in the past few months, chief among them is the...            
            
        New Micro Chip Security Solution
                With the outsourcing of microchip design and fabrication a worldwide, $350 billion business, bad actors along the supply chain have many opportunities to install...            
            
        INTERPOL 2015 – Israeli innovation, unique solutions and operational experience
                
 
Gil Reider, Director of Life Science, Aerospace Defense & HLS Department in the Israel Export and International Cooperation Institute:
"The Israel Export and International Cooperation...            
            
        Are computers Really Safe From Cyber Attacks?
                Most of us have already heard about ways of defending against possible cyber attacks: Don't open e-mails from people you don't know, choose a...            
            
        New Dangerous Cyberattacks Target AI Systems
                A new report by Computer scientists from the National Institute of Standards and Technology presents new kinds of cyberattacks that can “poison” AI systems.
AI...            
            
        Quantum Computers Makes The NSA Worried
                The US National Security Agency (NSA) has a serious concern: quantum computing. Last year, the NSA warned the general public that encryption algorithms that...            
            
        iHLS Moved Its Offices to State-Of-the-Art Complex In Ra’anana
                iHLS has moved into its offices in Ra’anana this week. Such a move is certainly cause for celebration, especially when the new offices are...            
            
        Communicating under water – a revolutionary Israeli development
                Dolphins communicate under water using sound waves that travel great distances. Now, human beings can also communicate under water, using a small device, attached...            
            
        6 Things Keeping Cybersecurity Experts Awake At Night
                Last month, some of the world’s foremost experts on cybersecurity gathered in Lille, France for the International Forum on Cybersecurity, as well as politicians,...            
            
        Deep Fakes and Identity Decentralization
                The growing trend of AI-generated content and deep fakes is making us lose our trust in the internet. Can identity decentralization be the solution?...            
            
        The Russian security market creates joint ventures
                
Rostec’s Security Technologies and ST Electronics from Singapore have signed a memorandum of understanding for cooperation in surveillance, integrated systems for security management, creation...            
            
        Cybercriminals Use Fake Google Ads to Steal User Credentials
                Cybercriminals have been running a sophisticated phishing campaign using fake Google Ads to steal user credentials, researchers from Malwarebytes Labs have uncovered. These malicious...            
            
        Autonomous Security Robot Joins a California Company
                One of the S&P 500 companies in Southern California has welcomed a new employee - a robot that will be patrolling and securing an...            
            
        Ghost Tap: A New NFC-Based Fraud Tactic Gaining Traction
                In recent years, payment using NFC one's phone has become increasingly common, as it is a method both safer and more convenient than carrying...            
            
        #OpIsrael2016: ISIS-Supporting Hackers To Attack Israel
                MadSec’s Cyber Intelligence team, which is investigating the cyber operation OpIsrael 2016 against Israel scheduled for April 7th, 2016, reports that the group of...            
            
        N Korea (Probably) Behind Cyber Attacks On SKAF
                North Korea is likely behind another cyber attack on South Korea’s digital infrastructure, United Press International reports. 
South Korea’s Air Force’s website has been...            
            
        US Air Force Loses Investigation Database
                We have recently written about the mind staggering fact that the Pentagon still uses floppy disks to perform nuclear missions. This new story is...            
            
        
 
            
