Illusive’s Deception Ensnares Hackers

0
In the field of cyber security, everyone has one main goal: staying ahead of the game. The hackers are constantly seeking out new avenues...

Image-Based System Could Replace Multi-Factor Authentication

0
Researchers from the Centre for Security Communication and Network Research (CSCAN) at Plymouth University have developed a new system for secure, multi-level authentication that...

US Steel: China Uses Cyber Stealth To Steal Secrets

0
US Steel Corporation, one of the world’s largest producers of steel, has filed a complaint with the US International Trade Commission (ITC) accusing China...

Backdoor-riddled Devices Sold To US Army, White House

0
AMX, a supplier of audio-visual and building control equipment among whose clients you’ll find the US Army and the White House, built in a...

Your (Not So) Private Browsing With Microsoft Edge

0
This last summer Microsoft’s Internet Explorer was superseded by the shiny and new Microsoft Edge browser, and everyone rejoiced. The aging IE, fraught with...

DHS Funds New Bitcoin Analytics Tool

0
US Department of Homeland Security Science and Technology Directorate (DHS S&T) is funding the development of a new Bitcoin analytics tool. As Bitcoin becomes...

Cyber Attack On Kremlin Website

0
Russian president's official website was targeted by a massive hacker attack during country-wide local elections, but the Kremlin's cyber defenses managed to cope with...

What Data Do Organizations Encrypt And Why?

0
Ilan Segelman, VP Sales & Business Development at Power communications and Operation Manager at Sophos Israel We at Sophos believe that there is no such...

Yahoo To Warn Users Of State Sponsored Hacking

0
Yahoo is now starting to warn users if they’ve been targeted by state-sponsored hackers, following similar moves by Google, Facebook, and Twitter. The announcement came...

Smart Watches Allow Hackers to Collect Users’ Data

0
They Look like the latest rage in jewelry and gadgetry, but like all computer devices, smart watches are vulnerable to hackers, say researchers at...

Every Single Organization Has At Least 1 Infected Mobile Device

0
Large organizations (companies or agencies with more than 200 iOS or Android mobile devices) are almost guaranteed to have at least one malware-infected device,...

Economic and Perceptual Change: Forecasts For The Internet of Things

0
The Internet of Things (IoT) trend is becoming more central in our lives and surrounds us everywhere. In everyday life this means the smart...

Day After Cyber Agreement: China Attacks

0
Last month President Barack Obama said that the U.S. would be “watching closely” to see if “words are followed by actions” after he and...

The Enemy Within: Most Cybercrimes By Employees

0
In an era where most organizations run on electronic communications, it is not only executives and IT engineers who hold the keys to the...

Video Analytics – Innovative Technology with Civilian and Security Uses

0
Video analytics is a technology that is used to identify, record, and analyze video streams via electronic media. Intelligent video analytics (IVA) helps end-users...

Heartbeat Based Biometric Identification

0
Canadian company Nymi has managed to develop a unique, first of its kind, technological solution: Paying with a wrist-bracelet that can detect the heartbeat...

Falling Behind in the Cyber War

0
By Rachel Ehrenfeld Shutting down the background check system of the Office of Personnel Management employees will do little to prevent the abuse of millions...

Teenager Breaks Into Personal E-mail of US Security Official. Again.

0
A second high-ranking American intelligence official has had his personal accounts breached in roughly three months. The personal online accounts of James Clapper, director...

The Browser Add-On to Protect Your Devices From Malware

0
  In the old days of the home computing, malware - viruses, computer worms, and trojan horses - ranged from the relatively harmless prank to...

The Russian security market creates joint ventures

0
Rostec’s Security Technologies and ST Electronics from Singapore have signed a memorandum of understanding for cooperation in surveillance, integrated systems for security management, creation...

Homeland Security seeking off-the-shelf applications to manage biometric data

0
The Department of Homeland Security’ Office of Biometric Identity Management is currently looking for off-the-shelf applications that can more effectively store, match and analyze...

More than 1,000 Organizations Join IBM to Battle Cybercrime

0
Participants across 16 Industries, Including Five of World's Top 10 banks, Six of Top 10 retailers, Use IBM X-Force Exchange Threat Intelligence IBM (NYSE: IBM)...

Latest

Metal That Behaves Like a Gel Could Redefine High-Temperature Systems

0
A research team at Texas A&M University has developed the world’s first metallic gel — a new class of material that combines the strength...