Israeli system intercepts cloud-stored data

0
Nowadays, everything is available at the palm of our hand. Nevertheless, these amazing capabilities, combined with our instinctive fear of the "Big Sister Syndrome"...

Want A Military-Grade Secure Smartphone?

0
The mobile-first organization is forced to operate in a new IT environment: compromised mobile devices, BYOD programs, and evolving cybercrime. Enterprises are struggling to...

New Trojan Horse Hiding In USB Devices Detected

0
A new torjan horse malware called USB Thief, which is virtually undetectable before and after penetrating the computer, was detected by ESET. The software...

The Flaws In The System: Fingerprint Biometric Security

0
Maxim Rupp, a information security researcher for the german company Cure53, has managed to penetrate the bimetric security of the Taiwanese company Chiuy Technology....

Quantum Computers Makes The NSA Worried

0
The US National Security Agency (NSA) has a serious concern: quantum computing. Last year, the NSA warned the general public that encryption algorithms that...

iHLS TV Future Forces For HLS

0
Future Forces For HLS Future Forces 4 HLS   The upcoming conference for the HLS Future Forces is to be held on July 21st, bringing with...

iHLS TV Interview – Gil Friedman , RED WAVES

0
Interview with Gil Friedman from RED WAVES What is Red Waves' main contribution ? The role of  manpower in such a system The main challenges in the development process The challenges Rad Waves faces in...

Cyber Wars? Not So Fast

0
Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...

Air-Gapped Computers Proven To Be Penetrable

0
Researchers from the  Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies...

Living in the future – technology as urban infrastructure

0
Google announces the formation of Sidewalk Labs, whose goal is finding technological solutions to issues rising in urban living such as living expenses, transportation...

Perimeter Security Market Expected To Grow Significantly

0
A new global forecast predicts that the market for perimeter intrusion detection systems will grow from its $2.36bn last year to $3.37bn by 2020,...

Cyber ​​Defense Is Essential To Assure Reliable Operation Of The Power...

0
Daniel Ehrenreich Cyber defense solution for Distributed Management Systems – DMS used by electric utilities are operating without interfering with the control process and therefore...

New Material to Protect from Electronic Surveillance

0
Conductive Composites, a small Utah company, has developed an extremely thin, flexible material, to shield from electronic emissions and electromagnetic pulses. Beyond traditional network-penetration, novel...

Programming With The Enemy

0
In a cost-saving move, Pentagon contractors subcontracted their work to the Russians, a four-year probe concludes. The probe was started in 2011 after John C...

#OpIsrael2016: ISIS-Supporting Hackers To Attack Israel

0
MadSec’s Cyber Intelligence team, which is investigating the cyber operation OpIsrael 2016 against Israel scheduled for April 7th, 2016, reports that the group of...

First iHLS Startups Accelerator Company Raises Funds

0
First capital raise by a company participating in the iHLS Startups Accelerator. The Israeli startup company IMNA Solutions of entrepreneur Israel Haikin completed a...

US, Israel to Sign Agreement to Cooperate in Cyber Defense

0
Israel and the United States have recently signed a cyber defense declaration calling for real-time operational connectivity through respective Computer Emergency Response Teams (CERTS)...

Credential Stealing Trojan Updated For Windows 10

0
Improved security was touted as one of the main advantages of Windows 10 over previous versions, as well as Microsoft’s newly launched Edge browser...

Could Your Brain Waves Be Hacked?

0
In light of numerous cyber attacks and security breaches, of which the attack on the American Office of Personnel Management (OPM) was perhaps the...

Ariel University to Establish Training Center For Cyber Protectors

0
Ariel University is currently establishing a training center for cyber protectors based on technology by Cyberbit, a subsidiary of Elbit Systems. The center will be...

City Surveillance Cameras double the force for authorities

0
As city centers became more crowded, so did crime become more common. In dealing with rising crime rates in its region, the Orlando City...

Elbit acquires NICE Systems Cyber and Intelligence division

0
Elbit Systems Ltd. announced today that it has signed an agreement to acquire  NICE Systems Cyber and Intelligence division for a total amount of...

Latest