Cyber Crime

Cyber Crime

cyber-security

0
If recent years could be defined with one thing, it would probably be the giant technological leap forward. With the benefits come difficulties, and as...
applications

0
With surging demand for applications, IT departments are facing increased pressure to deploy them more rapidly, leading to increasing complexity of their infrastructures, and...
iot security

2
While IoT devices and the data they collect and transmit present enormous benefits to consumers and industry, the relative insecurity of many devices presents...
dual-use technologies

0
Lawmakers in the European Union have advanced plans to subject hacking tools to export controls currently reserved for depleted uranium, human pathogens and other...
cybercrime

0
As cybercrime continues to escalate around the world, defenders from both the public and private sectors must meet the threat with equal force. Global...
ransomware attacks

3
Ransomware attacks have become more and more common, attracting more global focus. Rob Wainright the head of the Europol, the European Union Agency for...
iot devices

2
The Internet of Things (IoT) ecosystem includes a broad variety of devices and device-systems such as power plants, vehicles, home appliances, etc. Its global...
cyber security

3
As the frequency and sophistication of cyber-attacks continuously increase, governments and critical infrastructure providers face significant challenges. A cyber security solution designed for customers...
hacking

4
The US government has recently issued a rare public warning about hacking campaigns targeting energy and industrial firms. The Department of Homeland Security and...
airport

6
Heathrow Airport’s secret security planning has been revealed in files on a memory stick found in a London street. The documents outline routes and...
blockchain

11
More and more industries have been discovering the blockchain technology advantages in the field of enhanced security against hackers. Blockchain is a secure database...
cyber

14
Cyber vulnerabilities have long been acknowledged against commercial maritime vessels, but the targeting of new naval systems – whether for navigation, engine and steering...
cyber

77
Is an extensive cyber attack expected again? The Ukrainian cyber security firm, ISSP, recently announced that it may have detected a new computer virus...
cyber security

54
The cyber security sphere has become first priority in various organizations, and many resources have been invested in it. But what is the situation...
blockchain

152
The digital currency Bitcoin caught the Pentagon’s eyes as a potential cybersecurity shield. The US military has been open about their interest in Blockchain...
cyber crime

149
The US Homeland Security department has been increasing its fight against cyber crime. Infoblox Inc., the network control company that provides Actionable Network Intelligence,...
computer security

158
As hacking techniques are constantly improving, scientists have been trying to find new ways and authentication methods to secure computers. Researchers in South Korea...
autonomous vehicles

77
Will autonomous vehicles replace humans in the near future? Recent reports of major computer and bitcoin hacks have displayed the vulnerability of modern technologies...
cyber security rules

93
The United Kingdom has recently published a set of cyber security regulations, “Key principles of vehicle cyber security for connected and automated vehicles”. The...
cybersecurity platform

37
Recent cyber attacks have increased awareness security on the net. The cyber security market is one of the fastest growing industries in the past...
hacking

38
The more digital the world becomes, the more hacking becomes a serious threat. The world's smallest "non-hackable" security chip that can be widely used...
nuclear plants

26
Since May, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing...

iHLS Events

1034