Hackers Made Off With Massive FBI, DHS Employee Database

0
A rogue hacker group managed to penetrate the US Department of Homeland Security (DHS) secure network and make off with a database containing the...

Your (Not So) Private Browsing With Microsoft Edge

0
This last summer Microsoft’s Internet Explorer was superseded by the shiny and new Microsoft Edge browser, and everyone rejoiced. The aging IE, fraught with...

Israel: An Exemplar Of Cyber Development For The World Economic Forum

0
During the World Economic Forum in Davos, Switzerland in January, Israeli Prime Minister Benjamin Netanyahu led discussions on the subject of cyber security, and...

6 Things Keeping Cybersecurity Experts Awake At Night

0
Last month, some of the world’s foremost experts on cybersecurity gathered in Lille, France for the International Forum on Cybersecurity, as well as politicians,...

What Data Do Organizations Encrypt And Why?

0
Ilan Segelman, VP Sales & Business Development at Power communications and Operation Manager at Sophos Israel We at Sophos believe that there is no such...

Open Source: “The New Normal” For Big Data

0
Big Data is going open. Open-source, that is. Hadoop and Apache Spark are some of the biggest, hottest technologies in Big Data at this...

Backdoor-riddled Devices Sold To US Army, White House

0
AMX, a supplier of audio-visual and building control equipment among whose clients you’ll find the US Army and the White House, built in a...

Internet of Things Comes To Antarctica

0
Internet of Things (IoT) connectivity provider Sigfox will team up with GPS supplier Sonsolus and the Belgian government to provide a low-power, ultra-narrow band...

Teenager Breaks Into Personal E-mail of US Security Official. Again.

0
A second high-ranking American intelligence official has had his personal accounts breached in roughly three months. The personal online accounts of James Clapper, director...

Yahoo To Warn Users Of State Sponsored Hacking

0
Yahoo is now starting to warn users if they’ve been targeted by state-sponsored hackers, following similar moves by Google, Facebook, and Twitter. The announcement came...

Image-Based System Could Replace Multi-Factor Authentication

0
Researchers from the Centre for Security Communication and Network Research (CSCAN) at Plymouth University have developed a new system for secure, multi-level authentication that...

Elbit Provides RUAG Defence with Cyber Security Simulator

0
Elbit Systems' wholly-owned subsidiary, CYBERBIT, was awarded a contract to provide the Switzerland-based company, RUAG Defence, with CYBERBIT’s CyberShield - Cyber Security Trainer and...

Nearly Half Of Enterprises To Deploy IoT By End Of 2016

0
Nearly half of enterprises are set to deploy Internet of Things (IoT) by the end of 2016, according to findings from 451 Research, an...

Of Cyber And Regulation

0
Avi Yariv At the Cyber and Regulation conference, which took place in the University of Haifa last week, special attention was given to the regulatory...

The Browser Add-On to Protect Your Devices From Malware

0
  In the old days of the home computing, malware - viruses, computer worms, and trojan horses - ranged from the relatively harmless prank to...

Ariel University to Establish Training Center For Cyber Protectors

0
Ariel University is currently establishing a training center for cyber protectors based on technology by Cyberbit, a subsidiary of Elbit Systems. The center will be...

Credential Stealing Trojan Updated For Windows 10

0
Improved security was touted as one of the main advantages of Windows 10 over previous versions, as well as Microsoft’s newly launched Edge browser...

Cyber Wars? Not So Fast

0
Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...

Can We Fight DDoS Attacks For Extortion?

0
Gad Elkin, EMEA Security Information Director, F5 DDoS and ransomware are two well-established methods for cyber attacks, but a newly appeared tactic combines elements of...

Programming With The Enemy

0
In a cost-saving move, Pentagon contractors subcontracted their work to the Russians, a four-year probe concludes. The probe was started in 2011 after John C...

Online Extortion And Hacker Activity Expected To Rise In 2016

0
Trend Micro, a global leader in security information solutions, presents its annual security information forecast report. The expected trends include a rise in online...

The Physical Security Market Is Ascending To The Cloud

0
When the whole world is using the cloud, it comes as little surprise that even the most secured sectors will end up using it...

Latest