Business Security

Business Security

The US Defence Advanced Research Projects Agency (DARPA) is looking at ways it can utilise blockchain technology - the engine behind the Bitcoin cryptocurrency...

Hacktivist collective Anonymous have found a new target to wage cyber-war on: economic institutions. Anonymous have released a message warning of a series of...

US Steel Corporation, one of the world’s largest producers of steel, has filed a complaint with the US International Trade Commission (ITC) accusing China...

A new global forecast predicts that the market for perimeter intrusion detection systems will grow from its $2.36bn last year to $3.37bn by 2020,...

A new torjan horse malware called USB Thief, which is virtually undetectable before and after penetrating the computer, was detected by ESET. The software...

The US National Security Agency (NSA) has a serious concern: quantum computing. Last year, the NSA warned the general public that encryption algorithms that...

MadSec’s Cyber Intelligence team, which is investigating the cyber operation OpIsrael 2016 against Israel scheduled for April 7th, 2016, reports that the group of...

When the internet first started coming into being, security wasn’t really an issue, not even as an afterthought. This is was more than half...

Over the last few years a new menace has emerged: ransomware. Hackers now routinely take control and hold hostage the computer systems of businesses,...

Carbon nanotubes - is there anything they can’t do? They’re strong, hard, loaded with unique electrical, thermal, and optical properties, and have been heralded...

Personal information theft is one of the greatest risk factors for users online. Malicious websites that install malware designed to steal banking credentials, phishing...

While organizations spend tens of billions of dollars every year to protect themselves from cyber attacks, the disturbing truth is that in most cases,...

Strong Artificial Intelligence is still a long way off, it happens at all. But the worry that keeps creeping up is that once we...

In the complex realm of modern information security, communications networks are becoming increasingly larger and much more complex than in the past, creating a...

The mobile-first organization is forced to operate in a new IT environment: compromised mobile devices, BYOD programs, and evolving cybercrime. Enterprises are struggling to...

In the field of cyber security, everyone has one main goal: staying ahead of the game. The hackers are constantly seeking out new avenues...

US can’t be successful in banning encryption as it is a global phenomenon, according to Harvard study. Despite over two years’ efforts by the...

A rogue hacker group managed to penetrate the US Department of Homeland Security (DHS) secure network and make off with a database containing the...

This last summer Microsoft’s Internet Explorer was superseded by the shiny and new Microsoft Edge browser, and everyone rejoiced. The aging IE, fraught with...
video

During the World Economic Forum in Davos, Switzerland in January, Israeli Prime Minister Benjamin Netanyahu led discussions on the subject of cyber security, and...

Last month, some of the world’s foremost experts on cybersecurity gathered in Lille, France for the International Forum on Cybersecurity, as well as politicians,...

Ilan Segelman, VP Sales & Business Development at Power communications and Operation Manager at Sophos Israel We at Sophos believe that there is no such...