Energy Companies Attacked by Powerful Malware
                The version of destructive computer virus Shamoon was being employed to attack computers in Saudi Arabia and other regions in mid-November, as revealed by...            
            
        Israeli system intercepts cloud-stored data
                
Nowadays, everything is available at the palm of our hand. Nevertheless, these amazing capabilities, combined with our instinctive fear of the "Big Sister Syndrome"...            
            
        Nearly Half Of Enterprises To Deploy IoT By End Of 2016
                Nearly half of enterprises are set to deploy Internet of Things (IoT) by the end of 2016, according to findings from 451 Research, an...            
            
        OpenAI Unveils ChatGPT for Government Agencies
                OpenAI has launched a new version of its popular AI tool, ChatGPT, tailored specifically to meet the needs of US government agencies. Dubbed ChatGPT...            
            
        Open Source: “The New Normal” For Big Data
                Big Data is going open. Open-source, that is. Hadoop and Apache Spark are some of the biggest, hottest technologies in Big Data at this...            
            
        Four DARPA projects that could change the world
                Forty years ago, a group of researchers with military money set out to test the wacky idea of making computers talk to one another...            
            
        Cyber Wars? Not So Fast
                Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...            
            
        Monitoring Online Terror with AI
                Social media platforms on the internet are constantly flooded with huge amounts of content, and this vast ocean of material needs to be constantly...            
            
        Machine Learning Innovations Improve Financial Fraud Detection
                A recent study published in the International Journal of Information and Communication Technology sheds light on the potential of machine learning and deep learning...            
            
        Perimeter Security Market Expected To Grow Significantly
                A new global forecast predicts that the market for perimeter intrusion detection systems will grow from its $2.36bn last year to $3.37bn by 2020,...            
            
        Quantum Computers Makes The NSA Worried
                The US National Security Agency (NSA) has a serious concern: quantum computing. Last year, the NSA warned the general public that encryption algorithms that...            
            
        The private and public dangers of identity theft
                Let us do a little experiment: Try to close your eyes and think of the number of people you know that don’t have an...            
            
        Maglan will find the loophole
                Israel faces a real risk of a cyber attack on its pipe line systems providing water, chemicals, gas and other substances . Such an...            
            
        Economic and Perceptual Change: Forecasts For The Internet of Things
                The Internet of Things (IoT) trend is becoming more central in our lives and surrounds us everywhere. In everyday life this means the smart...            
            
        INTERPOL 2015 – Israeli innovation, unique solutions and operational experience
                
 
Gil Reider, Director of Life Science, Aerospace Defense & HLS Department in the Israel Export and International Cooperation Institute:
"The Israel Export and International Cooperation...            
            
        The Browser Add-On to Protect Your Devices From Malware
                 
In the old days of the home computing, malware - viruses, computer worms, and trojan horses - ranged from the relatively harmless prank to...            
            
        Credential Stealing Trojan Updated For Windows 10
                Improved security was touted as one of the main advantages of Windows 10 over previous versions, as well as Microsoft’s newly launched Edge browser...            
            
        Is The Data You Transfer Safe?
                Researchers from the College of Computing at the Georgia Institute of Technology were awarded $4.2 million from the Defense Advanced Research Projects Agency (DARPA)...            
            
        Living in the future – technology as urban infrastructure
                Google announces the formation of Sidewalk Labs, whose goal is finding technological solutions to issues rising in urban living such as living expenses, transportation...            
            
        Teenager Breaks Into Personal E-mail of US Security Official. Again.
                A second high-ranking American intelligence official has had his personal accounts breached in roughly three months. 
The personal online accounts of James Clapper, director...            
            
        First iHLS Startups Accelerator Company Raises Funds
                First capital raise by a company participating in the iHLS Startups Accelerator. 
The Israeli startup company IMNA Solutions of entrepreneur Israel Haikin completed a...            
            
        Protecting Operation Technologies in Production Lines as a Market Accelerator Trigger...
                Written by Or Shalom
OT (Operation Technologies) is in charge of physical operational processes for different needs in various sectors. They function as production lines...            
            
        
 
            
