Cyber Crime

Cyber Crime

IOT security

Cloudflare, the internet infrastructure and networking giant, has been expanding its focus to include mobile privacy and the security of connected devices. On November 11,...
bluetooth chip

Wireless access points can come in many forms, such as a router or an internet of things device. If a hacker gains access to...
cyber

The recent wave of ransomware attacks and preceding waves of cyber breaches could make it appear as though cyber criminals want their pay-off immediately....
5g network

5G wireless network deployments at major world events such as the 2018 Winter Games in PyeongChang have shown the great potential of a 5G-driven...
nuclear

A scary yet realistic scenario in the digital age could involve the following: attackers, sponsored by a rogue organization or radical state, gain access...
Cryptomining

Author: Aryeh Danon, Data Security Department Manager at Abnet Communications, distributing Sophos solutions in Israel. Hackers have discovered a new way to take advantage...
cyber attack

All US weapons that the Department of Defense tested between 2012 and 2017 have “mission critical” cyber vulnerabilities, claims a new report from the...
Router

Securing our routers and ensuring they are safe and protected is sometimes neglected by many. It is essential to check your router settings and...
IoT

Cybersecurity is an ongoing concern for many, especially with the proliferation of Internet of Things (IoT) technologies. The importance of securing IoT is increasingly...
Internet

Facebook has recently been in the spotlight for a security breach that compromised over 50 million accounts. This is a concern not only to...
iot security

In 2017, there were about 20 billion connected devices worldwide, according to Statista, which projects that the number will be more than 75 billion...

By Ilan Segelman, Power Communication (distributing Sophos solutions in Israel) Revealing private and secret information to unauthorized sources is an ever headline-grabbing issue. The Authority for...
internet's routing

The internet is essential to the exchange of all manner of information. It is not a single network, but rather is a complex grid...
blockchain

Once again, the retail giant Wal-Mart is using blockchain in order to increase effectivity and security. After it was awarded patents for a crypto-powered...
ai-based malware

Artificial intelligence could pose both opportunities and challenges as reported by the Center for a New American Security (CNAS), one of America’s top defense...

Cyberattacks and the methods by which the public and private sectors deter and counter them have occupied the headlines with increasing frequency in today’s...
VPN

VPN ,or virtual private network, is a term we hear more and more. This is understandable if you take into consideration the many varied...

Protecting against phishing attacks, in which malicious actors attempt to gain access to a user’s credentials (and then to systems and networks) through social...
supply chains

A recent research report from Accenture demonstrates that 86 percent of aerospace and defense companies (A&D) expect to integrate blockchain technology into their corporate...
security vulnerabilities

A new research discovered critical vulnerabilities in several BMW car models. Researchers from Keen Security Lab, a cybersecurity research unit of Chinese company Tencent,...
cyberattacks

Cyber threats on Israeli companies, organizations, and infrastructure grow daily. The Israeli National Cyber Security Authority has been concentrating its efforts to thwart this threat...
insider threats

Corporate IT security operations have just too much security data and no efficient way to sort through it. Combing through thousands of alerts from...

iHLS Events