Cyber Crime

Cyber Crime

cybersecurity

By Or Shalom, security and cyber expert and adviser The establishment of a work plan in the cyber field is not a simple task. Alongside...
cyber crime

A new IAI project in Singapore will help solve digital and cybercrimes. Israel Aerospace Industries, ELTA's Singaporean Cyber Subsidiary, Custodio Technologies, together with Singapore’s...
ransomware

A public health district in Illinois paid hackers a $350,000 ransom after facing a ransomware attack, an attack in which hackers lock up a...
phishing

A booming success rate in COVID-19 related phishing attacks. Phishing is a type of social engineering attack often used to steal user data, including...
organized crime

A man was recently charged in a UK court with making false ‘medical kits’ alleged to treat Covid-19. The kits allegedly contained harmful chemicals....

By Or Shalom Providing cyber defense to financial infrastructure and assets is complex, as these systems and infrastructures are usually situated in the public space....

Quantum computers are expected to supply the most powerful computing capabilities ever. Advances in quantum computing are finally beginning to reach commercial applications, such...
mobile cybersecurity

The mobile devices we use for nearly every aspect of our lives are vulnerable to attackers.  In fact, 88% of organizations worldwide experienced targeted phishing...
cybersecurity

RSA 2020 annual information security conference held in San Francisco during the last week of February focused on the Human Element in cybersecurity. Rohit...

Many people use simple and weak passwords for their devices, making it easy for intruders to hack their phones, computers, emails etc. Many employees...
cybersecurity

During the last few weeks, the media headlines kept us informed about the triple data leak from the Elector application - an app developed...

Facial-recognition technology, which matches photos of unidentified victims or suspects against enormous databases of photos, has long drawn intense criticism from privacy advocates. Now,...

Hackers are trying to take advantage of the Coronavirus fear with the goal of delivering malware and stealing information. The World Health Organization (WHO)...

Researchers from Ben-Gurion University of the Negev in Israel have figured out a way to steal information from an isolated computer not connected to...

Managing sensitive financial information and combating cyber threats are imperative for the safety and continuity of financial institutions. One of the major components of...
cybersecurity

Foreign adversaries and cybercriminals are getting more aggressive and advanced, and cyberthreats have become an economic and security threat. However, the cybersecurity workforce shortage...
cybercriminals targeting profit

The European Union’s police agency has recently noted that cybercriminals are exploiting online vulnerabilities and utilizing new technology to target more profitable victims. Europol has...
Photo illustration Pixabay

In April 2019, the PDF management service Lumin PDF suffered a data breach. The breach wasn't publicly disclosed until September when 15.5M records of...
photo port illust Pixabay

Increasingly connected and automated vessels are becoming a cybersecurity challenge. In an incident last February, a deep draft vessel on an international voyage sailed...
Photo illust

The growing network of the internet of things (IoT) can make life more convenient by automating your home and delivering data wherever you are....
cyber attack illust.

The US is enhancing its stance towards cybersecurity. A new cybersecurity directorate is being established as the National Security Agency’s (NSA) foreign intelligence and...
russian hackers

Russian hacking attacks leave the victim with a mere 19 minutes to respond to an attack, according to data published by computer security company...

iHLS Events