cyber, photo illus. by pixabay

The Price of A Brave New World

0
The Internet of Things (IoT) has been making major shifts in the world of both consumer and industrial electronics, however, it opens a door...
smart gun

What is Hampering Smart Gun Industry?

0
Smart guns are firearms equipped with technology that enables them to only be fired by an authorized user. Smart guns have the potential to...

Will Law Enforcement Accept Virtual Driver’s License?

0
The physical driver’s license is probably here to stay, but there are also other options that make identification and authentication more efficient, such as...
IOT security

Internet Giant will Supply Mobile and IoT Security

0
Cloudflare, the internet infrastructure and networking giant, has been expanding its focus to include mobile privacy and the security of connected devices. On November 11,...
cyber

How Companies Can Minimize Cyber Attack Damage

0
The recent wave of ransomware attacks and preceding waves of cyber breaches could make it appear as though cyber criminals want their pay-off immediately....
5g network

5G Network Not As Secured As Hoped

0
5G wireless network deployments at major world events such as the 2018 Winter Games in PyeongChang have shown the great potential of a 5G-driven...
Cryptomining

How Have You Become A Cryptominer?

0
Author: Aryeh Danon, Data Security Department Manager at Abnet Communications, distributing Sophos solutions in Israel. Hackers have discovered a new way to take advantage...

World’s Largest Deployment of Biometric Systems

0
Manual authentication in airports means that passengers need to present different forms of ID such as boarding cards, booking reference numbers as well as...
Router

Secure Your Router with 4 Steps

0
Securing our routers and ensuring they are safe and protected is sometimes neglected by many. It is essential to check your router settings and...
IoT

The Race to IoT Security

0
Cybersecurity is an ongoing concern for many, especially with the proliferation of Internet of Things (IoT) technologies. The importance of securing IoT is increasingly...
Internet

The End of the Internet Ecosystem as We Know It?

0
Facebook has recently been in the spotlight for a security breach that compromised over 50 million accounts. This is a concern not only to...
iot security

Will New Legislation Revolutionize IoT Security?

0
In 2017, there were about 20 billion connected devices worldwide, according to Statista, which projects that the number will be more than 75 billion...

Eight Steps for Coping with Information and Privacy Risks Online

0
By Ilan Segelman, Power Communication (distributing Sophos solutions in Israel) Revealing private and secret information to unauthorized sources is an ever headline-grabbing issue. The Authority for...
logistic items

Innovative Tech to Track Logistic Items on the Move

0
With incredible volumes of material on the move - arms and munitions, supplies, vehicles – the military needs a better way to track its...
blockchain

Retail Giant Turns to Blockchain for Enhanced Authentication

0
Once again, the retail giant Wal-Mart is using blockchain in order to increase effectivity and security. After it was awarded patents for a crypto-powered...

Learning To Deal With Cyber Attacks

0
Cyberattacks and the methods by which the public and private sectors deter and counter them have occupied the headlines with increasing frequency in today’s...

New Tool Against Phishing Attacks

0
Protecting against phishing attacks, in which malicious actors attempt to gain access to a user’s credentials (and then to systems and networks) through social...
supply chains

Blockchain – Securing Defense Industries’ Supply Chains

0
A recent research report from Accenture demonstrates that 86 percent of aerospace and defense companies (A&D) expect to integrate blockchain technology into their corporate...
voice recognition technology

Voice Recognition Technology is Gaining Momentum

0
China has been developing voice recognition technology for identification and surveillance purposes after it already turned face recognition into a constantly used technology. In...
autonomous car

Autonomous Car Security Tech to Be Implemented in UAVs

0
With the increasing automation and widespread use of unmanned aerial systems, potential cyber-attacks on aerial fleets are already a major concern. A recent collaboration...
authentication

Selfies to Provide Strictest Level Authentication

0
Cybercrime will become one of the greatest threats of our time, and this is particularly true for banks and insurers, who will increasingly look...
cybersecurity

Israeli Cybersecurity at Forefront of War Against Cybercrime

0
The cyber incidents that dominated global headlines over the past year indicated not only a growing trend but one that is escalating in size,...

Latest

Anthropic Launches Claude 4.5

0
Anthropic has introduced Claude 4.5, the latest version of its large language model, designed to handle longer, more complex tasks with improved accuracy across...