“As cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the mindset necessary...
Ransomware attacks on US healthcare have drastically increased in their sophistication and intensity over the last year, which is expected to continue into 2021.
In...
Deepfake technology involves the creation of synthetic media, generally, video material, using artificial intelligence and machine learning tools which allow for an individual’s facial...
According to a recent report from Unit 42, 83% of medical imaging devices are running on unsupported operating systems, making them potential avenues for...
The growing incidence of malicious cyber-attacks owing to the rising adoption of connected cars will propel the growth of the global automotive cybersecurity market....
As the COVID-19 pandemic started, private industries and tech sectors around the world developed smartphone-based solutions to automate the manual contact tracing process. While...
While cybersecurity budgets of companies and organizations increase, security resilience decreases. An Israeli cybersecurity startup helps companies shore up their security posture, and strives ...
Connected medical devices remotely monitoring patient data are exposed to various threats, including data breaches if the information is not properly encrypted, viruses and...
Until not long ago, smart security technologies were not necessarily connected with the other municipal aspects, such as smart traffic management, waste management, etc....
With an information society that transfers an increasingly large amount of personal data over public channels, information security has become a global challenge. Security...
Honeypots are not a new technique in cybersecurity. A honeypot is a computer system that’s intended to attract cyberattacks, like a decoy. It mimics...
Zero-day cyber attacks are among the most dangerous threats to computer systems and can cause serious and lasting damage. As an example, the WannaCry...
Iran and Russia signed an information security agreement that coordinates efforts between the two countries against cyber-related crimes.
According to a report by Iran’s IRGC-linked...
Many people already use fingerprint recognition technology to access their phones, but new research demonstrates a technique that maps out not only the unique...