Cyber Crime

Cyber Crime

organized crime

A man was recently charged in a UK court with making false ‘medical kits’ alleged to treat Covid-19. The kits allegedly contained harmful chemicals....

By Or Shalom Providing cyber defense to financial infrastructure and assets is complex, as these systems and infrastructures are usually situated in the public space....

Quantum computers are expected to supply the most powerful computing capabilities ever. Advances in quantum computing are finally beginning to reach commercial applications, such...
mobile cybersecurity

The mobile devices we use for nearly every aspect of our lives are vulnerable to attackers.  In fact, 88% of organizations worldwide experienced targeted phishing...
cybersecurity

RSA 2020 annual information security conference held in San Francisco during the last week of February focused on the Human Element in cybersecurity. Rohit...

Many people use simple and weak passwords for their devices, making it easy for intruders to hack their phones, computers, emails etc. Many employees...
cybersecurity

During the last few weeks, the media headlines kept us informed about the triple data leak from the Elector application - an app developed...

Facial-recognition technology, which matches photos of unidentified victims or suspects against enormous databases of photos, has long drawn intense criticism from privacy advocates. Now,...

Hackers are trying to take advantage of the Coronavirus fear with the goal of delivering malware and stealing information. The World Health Organization (WHO)...

Researchers from Ben-Gurion University of the Negev in Israel have figured out a way to steal information from an isolated computer not connected to...

Managing sensitive financial information and combating cyber threats are imperative for the safety and continuity of financial institutions. One of the major components of...
cybersecurity

Foreign adversaries and cybercriminals are getting more aggressive and advanced, and cyberthreats have become an economic and security threat. However, the cybersecurity workforce shortage...
cybercriminals targeting profit

The European Union’s police agency has recently noted that cybercriminals are exploiting online vulnerabilities and utilizing new technology to target more profitable victims. Europol has...
Photo illustration Pixabay

In April 2019, the PDF management service Lumin PDF suffered a data breach. The breach wasn't publicly disclosed until September when 15.5M records of...
photo port illust Pixabay

Increasingly connected and automated vessels are becoming a cybersecurity challenge. In an incident last February, a deep draft vessel on an international voyage sailed...
Photo illust

The growing network of the internet of things (IoT) can make life more convenient by automating your home and delivering data wherever you are....
cyber attack illust.

The US is enhancing its stance towards cybersecurity. A new cybersecurity directorate is being established as the National Security Agency’s (NSA) foreign intelligence and...
russian hackers

Russian hacking attacks leave the victim with a mere 19 minutes to respond to an attack, according to data published by computer security company...
security

Software vulnerabilities are frequently published on the web, for example on the US National Vulnerability Database — the official register of security vulnerabilities tracked...
hackers

Chinese espionage for western military technologies has reached a new stage. Chinese hackers have targeted over two dozen universities in the US and Canada...
passwords

Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...
iot

Industries are beginning to adopt Internet of Things (IoT) technologies in unprecedented scopes. However, security concerns continue to threaten IoT’s progress. A study by...

iHLS Events