Fostering Cyber-Defenses of Financial Institutions
                The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has been fostering the cyber-defenses of financial institutions. This research-and-development effort will...            
            
        Cyberthreats to UK Businesses – Industry Government Collaboration is Needed
                The annual assessment of the biggest cyberthreats to U.K. businesses has been published recently, after being produced jointly for the first time by the...            
            
        “Organizations are surprised to find out how many applications are used...
                Good Technologies unveiled a security system for mobile devices.
Gartner declared recently that “MDM is dead” – is this really the situation on the market?...            
            
        Situational Awareness for Business Firms in War Zones
                 
A new security system which brings together up-to-the-minute information on key security developments in Iraq and the implications for companies operating in the region...            
            
        Public Sector Trying to Defend Itself in Cyber Environment
                Distributed Denial of Service (DDoS) cyber attacks are a serious problem threatening companies and organizations across the globe. While weaponized data attacks on the...            
            
        Home depot all but confirms doozy of a data breach
                Home Depot may have experienced a massive security breach, which affected an estimated 110 million people.
Home Depot on Wednesday said it was investigating the possibility,...            
            
        New Mapping Solution for Improved Security Surveillance
                A new geospatial mapping interface allows users to better comprehend physical location information. The use of static facility floor plans overlaid directly onto the...            
            
        Authentication Technology to Deliver Safer Transactions
                Due to the rise of mobile transactions, passwords are not sufficiently secure as a means of authentication, and additional modes are required for next-generation...            
            
        Watch: New Sensor Will Detect Drone Pilots
                A new sensor called RF-300 was released by Dedrone, that automatically locates drones and their pilots.
The current ubiquity of drones makes for a very...            
            
        Machine Learning Innovations Improve Financial Fraud Detection
                A recent study published in the International Journal of Information and Communication Technology sheds light on the potential of machine learning and deep learning...            
            
        New Chinese Drone Could Serve Government Agencies
                A new Chinese drone known as the ‘Mavic 2 Enterprise’ drone now features swappable search and rescue accessories. The drone was upgraded specifically to...            
            
        Incorporating Security Technologies in Critical Infrastructure Structural Systems, Public Buildings and...
                Incorporating Security Technologies in Critical Infrastructure Structural Systems, Public Buildings and Real Estate
Written by Or Shalom
In the construction world, security has become a central...            
            
        AI-Voice Robocalls Declared Illegal in the US
                US regulators declared last week that scam "robocalls" made using voices created with artificial intelligence are now illegal.
This phenomenon gained attention last month after...            
            
        Cybercriminals Use Fake Google Ads to Steal User Credentials
                Cybercriminals have been running a sophisticated phishing campaign using fake Google Ads to steal user credentials, researchers from Malwarebytes Labs have uncovered. These malicious...            
            
        The Truth Behind the Mask – the Revolutionary Algorithm that Recognizes...
                Many industries nowadays want the ability to take the audio of a conversation and know the true feelings and hidden intentions of the speaker,...            
            
        Russia Ransomware Campaigns Target Microsoft Teams Users
                Sophos X-Ops, the threat research division of the British cybersecurity company Sophos, has revealed two active cyberattack campaigns targeting organizations that use Microsoft Office...            
            
        Ghost Tap: A New NFC-Based Fraud Tactic Gaining Traction
                In recent years, payment using NFC one's phone has become increasingly common, as it is a method both safer and more convenient than carrying...            
            
        OpenAI Unveils ChatGPT for Government Agencies
                OpenAI has launched a new version of its popular AI tool, ChatGPT, tailored specifically to meet the needs of US government agencies. Dubbed ChatGPT...            
            
        New System Ensures Secure IoT Data Transmission
                As the Internet of Things (IoT) continues to expand, connecting devices across homes, industries, and urban environments, the need for secure, reliable data transmission...            
            
        Gmail Data Leak: 183 Million Reasons to Rethink Your Password Security
                A new trove of stolen login credentials has surfaced online, with 183 million email addresses and passwords added to the “Have I Been Pwned”...            
            
        The New AI-Based, Open-Source Solution to Combat Evasive Cyberattacks
                As cyberattacks continue to rise globally, traditional security systems are struggling to keep up with increasingly sophisticated methods used by attackers. To counteract this,...            
            
        Critical Windows Vulnerability Under Active Exploitation
                A high-severity Windows vulnerability has been identified and is currently being exploited by threat actors. The flaw, tracked as CVE-2024-35250, lies in the Windows...            
            
        
 
            
