Open Source: “The New Normal” For Big Data
                Big Data is going open. Open-source, that is. Hadoop and Apache Spark are some of the biggest, hottest technologies in Big Data at this...            
            
        Backdoor-riddled Devices Sold To US Army, White House
                AMX, a supplier of audio-visual and building control equipment among whose clients you’ll find the US Army and the White House, built in a...            
            
        Internet of Things Comes To Antarctica
                Internet of Things (IoT) connectivity provider Sigfox will team up with GPS supplier Sonsolus and the Belgian government to provide a low-power, ultra-narrow band...            
            
        Teenager Breaks Into Personal E-mail of US Security Official. Again.
                A second high-ranking American intelligence official has had his personal accounts breached in roughly three months. 
The personal online accounts of James Clapper, director...            
            
        Yahoo To Warn Users Of State Sponsored Hacking
                Yahoo is now starting to warn users if they’ve been targeted by state-sponsored hackers, following similar moves by Google, Facebook, and Twitter.
The announcement came...            
            
        Image-Based System Could Replace Multi-Factor Authentication
                Researchers from the Centre for Security Communication and Network Research (CSCAN) at Plymouth University have developed a new system for secure, multi-level authentication that...            
            
        Elbit Provides RUAG Defence with Cyber Security Simulator
                Elbit Systems' wholly-owned subsidiary, CYBERBIT, was awarded a contract to provide the Switzerland-based company, RUAG Defence, with CYBERBIT’s CyberShield - Cyber Security Trainer and...            
            
        Nearly Half Of Enterprises To Deploy IoT By End Of 2016
                Nearly half of enterprises are set to deploy Internet of Things (IoT) by the end of 2016, according to findings from 451 Research, an...            
            
        Of Cyber And Regulation
                Avi Yariv
At the Cyber and Regulation conference, which took place in the University of Haifa last week, special attention was given to the regulatory...            
            
        The Browser Add-On to Protect Your Devices From Malware
                 
In the old days of the home computing, malware - viruses, computer worms, and trojan horses - ranged from the relatively harmless prank to...            
            
        Ariel University to Establish Training Center For Cyber Protectors
                Ariel University is currently establishing a training center for cyber protectors based on technology by Cyberbit, a subsidiary of Elbit Systems. The center will be...            
            
        Credential Stealing Trojan Updated For Windows 10
                Improved security was touted as one of the main advantages of Windows 10 over previous versions, as well as Microsoft’s newly launched Edge browser...            
            
        Cyber Wars? Not So Fast
                Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...            
            
        Can We Fight DDoS Attacks For Extortion?
                Gad Elkin, EMEA Security Information Director, F5
DDoS and ransomware are two well-established methods for cyber attacks, but a newly appeared tactic combines elements of...            
            
        Programming With The Enemy
                In a cost-saving move, Pentagon contractors subcontracted their work to the Russians, a four-year probe concludes.
The probe was started in 2011 after John C...            
            
        Online Extortion And Hacker Activity Expected To Rise In 2016
                Trend Micro, a global leader in security information solutions, presents its annual security information forecast report. The expected trends include a rise in online...            
            
        The Physical Security Market Is Ascending To The Cloud
                When the whole world is using the cloud, it comes as little surprise that even the most secured sectors will end up using it...            
            
        Microsoft Admits: Windows 10 Spying Cannot Be Stopped
                 Windows 10 constantly calls home - a lot. Back in August, Ars Technica reported on a list of features in Microsoft Windows 10 that...            
            
        New Material to Protect from Electronic Surveillance
                Conductive Composites, a small Utah company, has developed an extremely thin, flexible material, to shield from electronic emissions and electromagnetic pulses.
Beyond traditional network-penetration, novel...            
            
        Cyber Defense Is Essential To Assure Reliable Operation Of The Power...
                Daniel Ehrenreich
Cyber defense solution for Distributed Management Systems – DMS used by electric utilities are operating without interfering with the control process and therefore...            
            
        Is Now A Cyber Watershed For ISIS?
                The cyberattack on TalkTalk, a telecommunications company in Britain, could be a watershed moment in Islamic State's (Isis) cyberwar against the West, cybersecurity experts...            
            
        Can ISIS Attack Our Infrastructure?
                ISIS hackers have proven in the past their ability to break into different websites or the accounts of military and government personel. The US...            
            
        
 
            
