DARPA Looking For Blockchain-based Communications
                The US Defence Advanced Research Projects Agency (DARPA) is looking at ways it can utilise blockchain technology - the engine behind the Bitcoin cryptocurrency...            
            
        Anonymous To Take On Banks
                Hacktivist collective Anonymous have found a new target to wage cyber-war on: economic institutions. Anonymous have released a message warning of a series of...            
            
        US Steel: China Uses Cyber Stealth To Steal Secrets
                US Steel Corporation, one of the world’s largest producers of steel, has filed a complaint with the US International Trade Commission (ITC) accusing China...            
            
        Perimeter Security Market Expected To Grow Significantly
                A new global forecast predicts that the market for perimeter intrusion detection systems will grow from its $2.36bn last year to $3.37bn by 2020,...            
            
        New Trojan Horse Hiding In USB Devices Detected
                A new torjan horse malware called USB Thief, which is virtually undetectable before and after penetrating the computer, was detected by ESET. The software...            
            
        Quantum Computers Makes The NSA Worried
                The US National Security Agency (NSA) has a serious concern: quantum computing. Last year, the NSA warned the general public that encryption algorithms that...            
            
        #OpIsrael2016: ISIS-Supporting Hackers To Attack Israel
                MadSec’s Cyber Intelligence team, which is investigating the cyber operation OpIsrael 2016 against Israel scheduled for April 7th, 2016, reports that the group of...            
            
        Could DARPA Have Invented The Ultimate Cyber Security?
                When the internet first started coming into being, security wasn’t really an issue, not even as an afterthought. This is was more than half...            
            
        Ransomware Rises – The Growing Threat To International Security
                Over the last few years a new menace has emerged: ransomware. Hackers now routinely take control and hold hostage the computer systems of businesses,...            
            
        The New Cryptography: Carbon Nanotubes
                Carbon nanotubes - is there anything they can’t do? They’re strong, hard, loaded with unique electrical, thermal, and optical properties, and have been heralded...            
            
        This App Will Warn You If You’re About To Give Away...
                Personal information theft is one of the greatest risk factors for users online. Malicious websites that install malware designed to steal banking credentials, phishing...            
            
        The Israeli Startups: Maximum Security in Minimum Effort
                While organizations spend tens of billions of dollars every year to protect themselves from cyber attacks, the disturbing truth is that in most cases,...            
            
        Will AI Destroy Us? Probably not
                Strong Artificial Intelligence is still a long way off, it happens at all. But the worry that keeps creeping up is that once we...            
            
        How Do We Protect Communications Networks From Cyber Attacks?
                In the complex realm of modern information security, communications networks are becoming increasingly larger and much more complex than in the past, creating a...            
            
        Want A Military-Grade Secure Smartphone?
                The mobile-first organization is forced to operate in a new IT environment: compromised mobile devices, BYOD programs, and evolving cybercrime. Enterprises are struggling to...            
            
        Illusive’s Deception Ensnares Hackers
                In the field of cyber security, everyone has one main goal: staying ahead of the game. The hackers are constantly seeking out new avenues...            
            
        Harvard: US Can’t Ban Encryption
                US can’t be successful in banning encryption as it is a global phenomenon, according to Harvard study. 
Despite over two years’ efforts by the...            
            
        Hackers Made Off With Massive FBI, DHS Employee Database
                A rogue hacker group managed to penetrate the US Department of Homeland Security (DHS) secure network and make off with a database containing the...            
            
        Your (Not So) Private Browsing With Microsoft Edge
                This last summer Microsoft’s Internet Explorer was superseded by the shiny and new Microsoft Edge browser, and everyone rejoiced. The aging IE, fraught with...            
            
        Israel: An Exemplar Of Cyber Development For The World Economic Forum
                During the World Economic Forum in Davos, Switzerland in January, Israeli Prime Minister Benjamin Netanyahu led discussions on the subject of cyber security, and...            
            
        6 Things Keeping Cybersecurity Experts Awake At Night
                Last month, some of the world’s foremost experts on cybersecurity gathered in Lille, France for the International Forum on Cybersecurity, as well as politicians,...            
            
        What Data Do Organizations Encrypt And Why?
                Ilan Segelman, VP Sales & Business Development at Power communications and Operation Manager at Sophos Israel
We at Sophos believe that there is no such...            
            
        
 
            
