Business Security

Business Security

The US National Security Agency (NSA) has a serious concern: quantum computing. Last year, the NSA warned the general public that encryption algorithms that...

MadSec’s Cyber Intelligence team, which is investigating the cyber operation OpIsrael 2016 against Israel scheduled for April 7th, 2016, reports that the group of...

When the internet first started coming into being, security wasn’t really an issue, not even as an afterthought. This is was more than half...

Over the last few years a new menace has emerged: ransomware. Hackers now routinely take control and hold hostage the computer systems of businesses,...

Carbon nanotubes - is there anything they can’t do? They’re strong, hard, loaded with unique electrical, thermal, and optical properties, and have been heralded...

Personal information theft is one of the greatest risk factors for users online. Malicious websites that install malware designed to steal banking credentials, phishing...

While organizations spend tens of billions of dollars every year to protect themselves from cyber attacks, the disturbing truth is that in most cases,...

Strong Artificial Intelligence is still a long way off, it happens at all. But the worry that keeps creeping up is that once we...

In the complex realm of modern information security, communications networks are becoming increasingly larger and much more complex than in the past, creating a...

The mobile-first organization is forced to operate in a new IT environment: compromised mobile devices, BYOD programs, and evolving cybercrime. Enterprises are struggling to...

In the field of cyber security, everyone has one main goal: staying ahead of the game. The hackers are constantly seeking out new avenues...

US can’t be successful in banning encryption as it is a global phenomenon, according to Harvard study. Despite over two years’ efforts by the...

A rogue hacker group managed to penetrate the US Department of Homeland Security (DHS) secure network and make off with a database containing the...

This last summer Microsoft’s Internet Explorer was superseded by the shiny and new Microsoft Edge browser, and everyone rejoiced. The aging IE, fraught with...
video

During the World Economic Forum in Davos, Switzerland in January, Israeli Prime Minister Benjamin Netanyahu led discussions on the subject of cyber security, and...

Last month, some of the world’s foremost experts on cybersecurity gathered in Lille, France for the International Forum on Cybersecurity, as well as politicians,...

Ilan Segelman, VP Sales & Business Development at Power communications and Operation Manager at Sophos Israel We at Sophos believe that there is no such...

Big Data is going open. Open-source, that is. Hadoop and Apache Spark are some of the biggest, hottest technologies in Big Data at this...

AMX, a supplier of audio-visual and building control equipment among whose clients you’ll find the US Army and the White House, built in a...

Internet of Things (IoT) connectivity provider Sigfox will team up with GPS supplier Sonsolus and the Belgian government to provide a low-power, ultra-narrow band...

A second high-ranking American intelligence official has had his personal accounts breached in roughly three months. The personal online accounts of James Clapper, director...

Yahoo is now starting to warn users if they’ve been targeted by state-sponsored hackers, following similar moves by Google, Facebook, and Twitter. The announcement came...