Open Source: “The New Normal” For Big Data

0
Big Data is going open. Open-source, that is. Hadoop and Apache Spark are some of the biggest, hottest technologies in Big Data at this...

Backdoor-riddled Devices Sold To US Army, White House

0
AMX, a supplier of audio-visual and building control equipment among whose clients you’ll find the US Army and the White House, built in a...

Internet of Things Comes To Antarctica

0
Internet of Things (IoT) connectivity provider Sigfox will team up with GPS supplier Sonsolus and the Belgian government to provide a low-power, ultra-narrow band...

Teenager Breaks Into Personal E-mail of US Security Official. Again.

0
A second high-ranking American intelligence official has had his personal accounts breached in roughly three months. The personal online accounts of James Clapper, director...

Yahoo To Warn Users Of State Sponsored Hacking

0
Yahoo is now starting to warn users if they’ve been targeted by state-sponsored hackers, following similar moves by Google, Facebook, and Twitter. The announcement came...

Image-Based System Could Replace Multi-Factor Authentication

0
Researchers from the Centre for Security Communication and Network Research (CSCAN) at Plymouth University have developed a new system for secure, multi-level authentication that...

Elbit Provides RUAG Defence with Cyber Security Simulator

0
Elbit Systems' wholly-owned subsidiary, CYBERBIT, was awarded a contract to provide the Switzerland-based company, RUAG Defence, with CYBERBIT’s CyberShield - Cyber Security Trainer and...

Nearly Half Of Enterprises To Deploy IoT By End Of 2016

0
Nearly half of enterprises are set to deploy Internet of Things (IoT) by the end of 2016, according to findings from 451 Research, an...

Of Cyber And Regulation

0
Avi Yariv At the Cyber and Regulation conference, which took place in the University of Haifa last week, special attention was given to the regulatory...

The Browser Add-On to Protect Your Devices From Malware

0
  In the old days of the home computing, malware - viruses, computer worms, and trojan horses - ranged from the relatively harmless prank to...

Ariel University to Establish Training Center For Cyber Protectors

0
Ariel University is currently establishing a training center for cyber protectors based on technology by Cyberbit, a subsidiary of Elbit Systems. The center will be...

Credential Stealing Trojan Updated For Windows 10

0
Improved security was touted as one of the main advantages of Windows 10 over previous versions, as well as Microsoft’s newly launched Edge browser...

Cyber Wars? Not So Fast

0
Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...

Can We Fight DDoS Attacks For Extortion?

0
Gad Elkin, EMEA Security Information Director, F5 DDoS and ransomware are two well-established methods for cyber attacks, but a newly appeared tactic combines elements of...

Programming With The Enemy

0
In a cost-saving move, Pentagon contractors subcontracted their work to the Russians, a four-year probe concludes. The probe was started in 2011 after John C...

Online Extortion And Hacker Activity Expected To Rise In 2016

0
Trend Micro, a global leader in security information solutions, presents its annual security information forecast report. The expected trends include a rise in online...

The Physical Security Market Is Ascending To The Cloud

0
When the whole world is using the cloud, it comes as little surprise that even the most secured sectors will end up using it...

Microsoft Admits: Windows 10 Spying Cannot Be Stopped

0
 Windows 10 constantly calls home - a lot. Back in August, Ars Technica reported on a list of features in Microsoft Windows 10 that...

New Material to Protect from Electronic Surveillance

0
Conductive Composites, a small Utah company, has developed an extremely thin, flexible material, to shield from electronic emissions and electromagnetic pulses. Beyond traditional network-penetration, novel...

Cyber ​​Defense Is Essential To Assure Reliable Operation Of The Power...

0
Daniel Ehrenreich Cyber defense solution for Distributed Management Systems – DMS used by electric utilities are operating without interfering with the control process and therefore...

Is Now A Cyber Watershed For ISIS?

0
The cyberattack on TalkTalk, a telecommunications company in Britain, could be a watershed moment in Islamic State's (Isis) cyberwar against the West, cybersecurity experts...

Can ISIS Attack Our Infrastructure?

0
ISIS hackers have proven in the past their ability to break into different websites or the accounts of military and government personel. The US...

Latest

Metal That Behaves Like a Gel Could Redefine High-Temperature Systems

0
A research team at Texas A&M University has developed the world’s first metallic gel — a new class of material that combines the strength...