Illusive’s Deception Ensnares Hackers
                In the field of cyber security, everyone has one main goal: staying ahead of the game. The hackers are constantly seeking out new avenues...            
            
        Image-Based System Could Replace Multi-Factor Authentication
                Researchers from the Centre for Security Communication and Network Research (CSCAN) at Plymouth University have developed a new system for secure, multi-level authentication that...            
            
        US Steel: China Uses Cyber Stealth To Steal Secrets
                US Steel Corporation, one of the world’s largest producers of steel, has filed a complaint with the US International Trade Commission (ITC) accusing China...            
            
        Backdoor-riddled Devices Sold To US Army, White House
                AMX, a supplier of audio-visual and building control equipment among whose clients you’ll find the US Army and the White House, built in a...            
            
        Your (Not So) Private Browsing With Microsoft Edge
                This last summer Microsoft’s Internet Explorer was superseded by the shiny and new Microsoft Edge browser, and everyone rejoiced. The aging IE, fraught with...            
            
        DHS Funds New Bitcoin Analytics Tool
                US Department of Homeland Security Science and Technology Directorate (DHS S&T) is funding the development of a new Bitcoin analytics tool. 
As Bitcoin becomes...            
            
        Cyber Attack On Kremlin Website
                Russian president's official website was targeted by a massive hacker attack during country-wide local elections, but the Kremlin's cyber defenses managed to cope with...            
            
        What Data Do Organizations Encrypt And Why?
                Ilan Segelman, VP Sales & Business Development at Power communications and Operation Manager at Sophos Israel
We at Sophos believe that there is no such...            
            
        Yahoo To Warn Users Of State Sponsored Hacking
                Yahoo is now starting to warn users if they’ve been targeted by state-sponsored hackers, following similar moves by Google, Facebook, and Twitter.
The announcement came...            
            
        Smart Watches Allow Hackers to Collect Users’ Data
                They Look like the latest rage in jewelry and gadgetry, but like all computer devices, smart watches are vulnerable to hackers, say researchers at...            
            
        Every Single Organization Has At Least 1 Infected Mobile Device
                Large organizations (companies or agencies with more than 200 iOS or Android mobile devices) are almost guaranteed to have at least one malware-infected device,...            
            
        Economic and Perceptual Change: Forecasts For The Internet of Things
                The Internet of Things (IoT) trend is becoming more central in our lives and surrounds us everywhere. In everyday life this means the smart...            
            
        Day After Cyber Agreement: China Attacks
                Last month President Barack Obama said that the U.S. would be “watching closely” to see if “words are followed by actions” after he and...            
            
        The Enemy Within: Most Cybercrimes By Employees
                In an era where most organizations run on electronic communications, it is not only executives and IT engineers who hold the keys to the...            
            
        Video Analytics – Innovative Technology with Civilian and Security Uses
                Video analytics is a technology that is used to identify, record, and analyze video streams via electronic media. Intelligent video analytics (IVA) helps end-users...            
            
        Heartbeat Based Biometric Identification
                Canadian company Nymi has managed to develop a unique, first of its kind, technological solution: Paying with a wrist-bracelet that can detect the heartbeat...            
            
        Falling Behind in the Cyber War
                By Rachel Ehrenfeld
Shutting down the background check system of the Office of Personnel Management employees will do little to prevent the abuse of millions...            
            
        Teenager Breaks Into Personal E-mail of US Security Official. Again.
                A second high-ranking American intelligence official has had his personal accounts breached in roughly three months. 
The personal online accounts of James Clapper, director...            
            
        The Browser Add-On to Protect Your Devices From Malware
                 
In the old days of the home computing, malware - viruses, computer worms, and trojan horses - ranged from the relatively harmless prank to...            
            
        The Russian security market creates joint ventures
                
Rostec’s Security Technologies and ST Electronics from Singapore have signed a memorandum of understanding for cooperation in surveillance, integrated systems for security management, creation...            
            
        Homeland Security seeking off-the-shelf applications to manage biometric data
                The Department of Homeland Security’ Office of Biometric Identity Management is currently looking for off-the-shelf applications that can more effectively store, match and analyze...            
            
        More than 1,000 Organizations Join IBM to Battle Cybercrime
                Participants across 16 Industries, Including Five of World's Top 10 banks, Six of Top 10 retailers, Use IBM X-Force Exchange Threat Intelligence
IBM (NYSE: IBM)...            
            
        
 
            
