UK Communications Company Hacked By “Russian Jihadis”
                TalkTalk, the British telecoms company, has admitted that it has suffered its third major cyberattack in the last 12 months with data from its...            
            
        US Joins S. Korea In Thwarting North’s Cyber Attacks
                The Obama administration and lawmakers are looking to South Korea to help thwart Pyongyang’s attempts to upgrade and strengthen its cyber capabilities. The country’s...            
            
        Day After Cyber Agreement: China Attacks
                Last month President Barack Obama said that the U.S. would be “watching closely” to see if “words are followed by actions” after he and...            
            
        Are There Solutions For Continuous Cyber Attacks?
                The last few weeks saw a number of financial companies become a target for cyber attacks and attempted blackmail using threats. The companies attacked...            
            
        China And US To Stop Cyber Attacks
                The US, though used to leading in the military and intelligence fronts, has found itself in the past year at a disadvantage when it...            
            
        World’s First Drone Test For Mail Delivery
                The use of commercial drones for delivering mail is one step closer to reality in Singapore, after the testing of Singpost’s Unmanned Aerial Vehicle...            
            
        Lack Of Nuclear Power Plant Security Measures Pose Risks
                A study of the information security measures at civilian nuclear energy facilities around the world found a wide range of problems at many facilities...            
            
        ECJ: U.S. Data Systems Exposed To State
                The European Court of Justice (ECJ) in Luxembourg has ruled that U.S. digital data storage systems fail to provide sufficient privacy from state surveillance.
According...            
            
        Voice Biometrics Can Be Defeated
                Voice biometrics is based on the assumption that each person has a unique voice that depends not only on his or her physiological features...            
            
        One Step Ahead: Intelligence StartUp Goes Behind Enemy Lines
                One of the things the United States has learned from the war in Iraq was to foresee the threat lurking around the corner. Soldiers...            
            
        FBI Warns of Security Breaches in IoT
                Amidst all the excitement about the possible benefits of the Internet of Things, a slew of warnings have been sounded by IT pros, vendors...            
            
        The Enemy Within: Most Cybercrimes By Employees
                In an era where most organizations run on electronic communications, it is not only executives and IT engineers who hold the keys to the...            
            
        Smart Watches Allow Hackers to Collect Users’ Data
                They Look like the latest rage in jewelry and gadgetry, but like all computer devices, smart watches are vulnerable to hackers, say researchers at...            
            
        Cyber Attack On Kremlin Website
                Russian president's official website was targeted by a massive hacker attack during country-wide local elections, but the Kremlin's cyber defenses managed to cope with...            
            
        Are computers Really Safe From Cyber Attacks?
                Most of us have already heard about ways of defending against possible cyber attacks: Don't open e-mails from people you don't know, choose a...            
            
        Could Your Brain Waves Be Hacked?
                In light of numerous cyber attacks and security breaches, of which the attack on the American Office of Personnel Management (OPM) was perhaps the...            
            
        U.S. Considers Sanctions On Russia And China
                The United States has had to deal with a series of embarassing cyber attack in the past few months, chief among them is the...            
            
        Next Generation of Cyber Security: Behavior Based Security System
                Security leaks have reached an all-time high these days, and are causing great concern among financial advisors, business owners and consumers. Nowadays there are...            
            
        The Earthquake Has Passed – How Do You Prepare For The...
                Natural disasters may cause loss of information existing in the computer systems, leading to businesses and infrastructure collapsing. Proper planning for recovery after natural...            
            
        Secure Biometric Technology For Paying The Register
                Biometric identification means have been around for some time now, helping commercial companies to keep their information secure and their offices compartmentalized. Being an...            
            
        Heartbeat Based Biometric Identification
                Canadian company Nymi has managed to develop a unique, first of its kind, technological solution: Paying with a wrist-bracelet that can detect the heartbeat...            
            
        Countries In The Virtual Battlefield
                In the past, wars took place only in the real world: Armies battled each other in the physical spaces while using guns, cannons set...            
            
        
 
            
