Video Systems, Less Familiar Target of Cyber Threats
By Dorit Guterman, Ledico Security Systems, Tomer Nuri, Team
Information and cyber security events can occur also via security cameras and other IoT devices. As result,...
Strategic Collaboration Will Apply Blockchain to Cybersecurity
Blockchain technology has recently caught the world's attention because of the central role it plays in enabling cryptocurrencies. It enables secure information transmission on...
New Smartphone Password Security Breach Found
New study from Nanyang Technological University, Singapore (NTU Singapore) has found a new security breach that hackers could use to guess your phone's PIN...
Financial Sector at Special Risk from Ransomware Attacks
Ransomware attacks have become more and more common, attracting more global focus. Rob Wainright the head of the Europol, the European Union Agency for...
Can You Assess IoT Devices Risk?
The Internet of Things (IoT) ecosystem includes a broad variety of devices and device-systems such as power plants, vehicles, home appliances, etc. Its global...
Authentication Technology to Deliver Safer Transactions
Due to the rise of mobile transactions, passwords are not sufficiently secure as a means of authentication, and additional modes are required for next-generation...