Cyber Crime

Cyber Crime

internet's routing

The internet is essential to the exchange of all manner of information. It is not a single network, but rather is a complex grid...
blockchain

Once again, the retail giant Wal-Mart is using blockchain in order to increase effectivity and security. After it was awarded patents for a crypto-powered...
ai-based malware

Artificial intelligence could pose both opportunities and challenges as reported by the Center for a New American Security (CNAS), one of America’s top defense...

Cyberattacks and the methods by which the public and private sectors deter and counter them have occupied the headlines with increasing frequency in today’s...
VPN

VPN ,or virtual private network, is a term we hear more and more. This is understandable if you take into consideration the many varied...

Protecting against phishing attacks, in which malicious actors attempt to gain access to a user’s credentials (and then to systems and networks) through social...
supply chains

A recent research report from Accenture demonstrates that 86 percent of aerospace and defense companies (A&D) expect to integrate blockchain technology into their corporate...
security vulnerabilities

A new research discovered critical vulnerabilities in several BMW car models. Researchers from Keen Security Lab, a cybersecurity research unit of Chinese company Tencent,...
cyberattacks

Cyber threats on Israeli companies, organizations, and infrastructure grow daily. The Israeli National Cyber Security Authority has been concentrating its efforts to thwart this threat...
insider threats

Corporate IT security operations have just too much security data and no efficient way to sort through it. Combing through thousands of alerts from...
cybersecurity

Japan will be hosting the 2019 Rugby World Championship and the 2020 Olympics and Paralympics, global events that are likely to attract attention from...
cybersecurity

By Ilan Segelman, Power Communication The multiple cyber attacks have led to an increasing awareness of the senior executives in organizations to the cyber attacks’...
cybersecurity

Nearly 1,000 data-breaches occurred in the first-half of 2017. Each new breach raises fears that trust in the global digital economy is eroding. In...
cybersecurity

While hackers have been constantly reaching out for new technologies, information security teams are also obliged to adopt advanced technological methods in order to...

It is commonly assumed that the task of cyber attackers will always be easier than the cyber security teams’ mission, because the assailants need...
sensitive data

A new technology aims to help the US Department of Homeland Security (DHS) allow sensitive data to be shared and analyzed while it remains...
cyber resiliency

The U.S. military’s weapons systems today are reliant on complex software and interconnectivity with a host of components, sensors and computer systems. The highly...
cyber threats

The increasing sophistication of cyber threats has become one of the main concerns of the aviation industry as airports and airlines realize they are...
cyber attacks

As railways adopt more automated, wireless and connected technologies, their most safety-critical assets have become exposed to new and more dangerous types of cyber...
cyber

To date, there has been no confirmed downing of a commercial or military aircraft through a cyber attack. However, given the weaknesses in the...
The Pepper Robot Is Vulnerable To Ransomware Attacks

Security services firm IOActive has warned that tens of thousands of robots are a threat to human safety after its researchers were able to...
autonomous

Autonomous vehicle technology is an emerging global market. By 2025, the partially autonomous vehicles market is expected to be at 36 billion U.S. dollars...

iHLS Events