Cyber Crime

Cyber Crime

blockchain

6
More and more industries have been discovering the blockchain technology advantages in the field of enhanced security against hackers. Blockchain is a secure database...
cyber

8
Cyber vulnerabilities have long been acknowledged against commercial maritime vessels, but the targeting of new naval systems – whether for navigation, engine and steering...
cyber

72
Is an extensive cyber attack expected again? The Ukrainian cyber security firm, ISSP, recently announced that it may have detected a new computer virus...
cyber security

51
The cyber security sphere has become first priority in various organizations, and many resources have been invested in it. But what is the situation...
blockchain

143
The digital currency Bitcoin caught the Pentagon’s eyes as a potential cybersecurity shield. The US military has been open about their interest in Blockchain...
cyber crime

146
The US Homeland Security department has been increasing its fight against cyber crime. Infoblox Inc., the network control company that provides Actionable Network Intelligence,...
computer security

153
As hacking techniques are constantly improving, scientists have been trying to find new ways and authentication methods to secure computers. Researchers in South Korea...
autonomous vehicles

75
Will autonomous vehicles replace humans in the near future? Recent reports of major computer and bitcoin hacks have displayed the vulnerability of modern technologies...
cyber security rules

90
The United Kingdom has recently published a set of cyber security regulations, “Key principles of vehicle cyber security for connected and automated vehicles”. The...
cybersecurity platform

33
Recent cyber attacks have increased awareness security on the net. The cyber security market is one of the fastest growing industries in the past...
hacking

30
The more digital the world becomes, the more hacking becomes a serious threat. The world's smallest "non-hackable" security chip that can be widely used...
nuclear plants

21
Since May, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing...
cyber-defenses

59
The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has been fostering the cyber-defenses of financial institutions. This research-and-development effort will...
communication encryption

91
The past few years have been rough on law enforcement agencies around the world. Online communication is encrypted most of the time, making it...
cyber

111
The cyber sphere has been gaining increased importance regarding the conduct of states, security organizations and the business realm. The vital need to secure...
cyber attack

188
By Arie Egozi This time the cyber attack was used for extortion. But it may go further, much further and cause huge catastrophes. Hackers exploiting malicious...
security breaches

81
Mobile phone apps have increasingly become vulnerable to security breaches. Virginia Tech researchers have recently discovered that the same apps we regularly use on...
iot security

126
Internet of Things - IoT security breaches have been dominating headlines lately. Even if you personally don’t suffer consequences of the mediocre security of...
cyber crime

359
Lockheed Martin will support the US Department of Defense's efforts against cyber criminals under a new contract. The company will continue its role as...
cyberthreats

57
The annual assessment of the biggest cyberthreats to U.K. businesses has been published recently, after being produced jointly for the first time by the...
cyber

144
In the near future, the cyber industry will have to cope with a wider array of cyber threats and challenges resulting from the vulnerabilities...
Cybersecurity

73
Following the recent New York Times report about what may be the largest leak of C.I.A documents in history on WikiLeaks, Michael Hill, a...

iHLS Events

5

1021