Israeli CTERA to Provide Private Cloud System to US MoD

0
Israeli startup firm CTERA Networks has won a tender to provide a private cloud system for file sharing to the US Ministry of Defense....

iHLS Moved Its Offices to State-Of-the-Art Complex In Ra’anana

0
iHLS has moved into its offices in Ra’anana this week. Such a move is certainly cause for celebration, especially when the new offices are...

N Korea (Probably) Behind Cyber Attacks On SKAF

0
North Korea is likely behind another cyber attack on South Korea’s digital infrastructure, United Press International reports. South Korea’s Air Force’s website has been...

BAE Systems And Fujitsu Announce Cyber Threat Sharing System

0
British defence manufacturer BAE Systems and Japanese technology giant Fujitsu have announced a partnership to develop and implement a Cyber Threat Intelligence (CTI) sharing...

Rafael Chooses Oracle’s ERP Cloud Solution

0
The defense sector was not one of the first to move to the cloud, but it seems the revolution has reached it too. The...

DARPA Looking For Blockchain-based Communications

0
The US Defence Advanced Research Projects Agency (DARPA) is looking at ways it can utilise blockchain technology - the engine behind the Bitcoin cryptocurrency...

Anonymous To Take On Banks

0
Hacktivist collective Anonymous have found a new target to wage cyber-war on: economic institutions. Anonymous have released a message warning of a series of...

US Steel: China Uses Cyber Stealth To Steal Secrets

0
US Steel Corporation, one of the world’s largest producers of steel, has filed a complaint with the US International Trade Commission (ITC) accusing China...

Perimeter Security Market Expected To Grow Significantly

0
A new global forecast predicts that the market for perimeter intrusion detection systems will grow from its $2.36bn last year to $3.37bn by 2020,...

New Trojan Horse Hiding In USB Devices Detected

0
A new torjan horse malware called USB Thief, which is virtually undetectable before and after penetrating the computer, was detected by ESET. The software...

Quantum Computers Makes The NSA Worried

0
The US National Security Agency (NSA) has a serious concern: quantum computing. Last year, the NSA warned the general public that encryption algorithms that...

#OpIsrael2016: ISIS-Supporting Hackers To Attack Israel

0
MadSec’s Cyber Intelligence team, which is investigating the cyber operation OpIsrael 2016 against Israel scheduled for April 7th, 2016, reports that the group of...

Could DARPA Have Invented The Ultimate Cyber Security?

0
When the internet first started coming into being, security wasn’t really an issue, not even as an afterthought. This is was more than half...

Ransomware Rises – The Growing Threat To International Security

0
Over the last few years a new menace has emerged: ransomware. Hackers now routinely take control and hold hostage the computer systems of businesses,...

The New Cryptography: Carbon Nanotubes

0
Carbon nanotubes - is there anything they can’t do? They’re strong, hard, loaded with unique electrical, thermal, and optical properties, and have been heralded...

This App Will Warn You If You’re About To Give Away...

0
Personal information theft is one of the greatest risk factors for users online. Malicious websites that install malware designed to steal banking credentials, phishing...

The Israeli Startups: Maximum Security in Minimum Effort

0
While organizations spend tens of billions of dollars every year to protect themselves from cyber attacks, the disturbing truth is that in most cases,...

Will AI Destroy Us? Probably not

0
Strong Artificial Intelligence is still a long way off, it happens at all. But the worry that keeps creeping up is that once we...

How Do We Protect Communications Networks From Cyber Attacks?

0
In the complex realm of modern information security, communications networks are becoming increasingly larger and much more complex than in the past, creating a...

Want A Military-Grade Secure Smartphone?

0
The mobile-first organization is forced to operate in a new IT environment: compromised mobile devices, BYOD programs, and evolving cybercrime. Enterprises are struggling to...

Illusive’s Deception Ensnares Hackers

0
In the field of cyber security, everyone has one main goal: staying ahead of the game. The hackers are constantly seeking out new avenues...

Harvard: US Can’t Ban Encryption

0
US can’t be successful in banning encryption as it is a global phenomenon, according to Harvard study. Despite over two years’ efforts by the...

Latest

Image provided by pixabay

Data Breaches Are Connected to Mass Layoffs, Research

0
A research team from Binghamton University and the State University of New York explains the connection between mass layoffs and data breaches, theorizing that...