Cyber Crime

Cyber Crime

Cyber space. image by pixabay

Last year marked a turning point in the fight against ransomware as the collaboration among law enforcement agencies led to high-profile arrests, and the...
vr headset. image by pixabay

In February 2022, Gartner predicted that 25 percent of people will spend at least one hour per day in the metaverse by 2026. Backed...
automotive. image by pixabay

The autonomous, connected, electric and shared (ACES) trends bring new requirements that modern automotive operating systems need to be capable of handling. The growing...
cybercriminals targeting profit

While deep learning algorithms may be looking promising for identifying and characterizing cybersecurity intrusions, various attacks can cause them to provide inaccurate information, or...
Smart phone.image by pixabay

If you think your smartphone is safe as long as no one touches it, you are wrong. While yes, many attacks on smartphones require...
mobile-phones. image by pixabay

The Israeli Minister of Communications Yoaz Hendel has announced that the Ministry of Communications has begun its' efforts to put an end to the...
spyware. image by pixabay

Researchers at the Indian Institute of Technology Madras have developed an innovative algorithm to mitigate disruptions in critical networks such as air traffic control...
Cyber Security. image by pixabay

While cyber criminals are constantly changing their tactics, legislation and standardization often take years, leaving law enforcement efforts without substantial countermeasures. Now, Europe is...
Cyber security. image by pixabay

In the 21st century, technology has become an integral part of our lives. We are constantly exposed to it on a daily basis, and...
computing. image by pixabay

Overworked security operations teams, the increasing frequency of large-scale ransomware attacks, paired with the shift to a new era of hybrid work, have created...
Medical Sector. image by pixabay

Ransomware attacks on US healthcare have drastically increased in their sophistication and intensity over the last year, which is expected to continue into 2022....
IoT. image by pixabay

The threat of internal cyberattacks, from suppliers or employees, continues to be a global concern, with IoT devices being especially vulnerable. wInternal personnel are...
Top Secret. image by pixabay

With so many employees now working remotely, the cyber attack surface has been increasingly expanding. Officials at the US Defense Information Systems Agency say...
Driver on Highway. image by pixabay

Time and again, the protection of data from unauthorized access is proving more and more challenging. One of the most common cyber security problems...
Cyber space. image by pixabay

At least 60 serious cyber attack attempts target the armed forces and other parts of UK defense every day. In order to confront this...
security. image by pixabay

With the world of security constantly changing and hackers adapting to those changes, nothing is perfect in terms of security. While two-factor authentication is...
Virtual Reality. image by pixabay

Voice command features on virtual reality headsets could lead to major privacy leakages, known as “eavesdropping attacks.” Built-in motion sensors within common VR headsets...
cyber security. image by pixabay

Ransomware and malware, as well as cyberattacks, are a real threat to the systems of governments and local authorities, and the number of warnings...
cyber attack. image by pixabay

Ransomware is malicious software that encrypts a computer system’s data and demands payment to restore access. To help organizations protect against ransomware attacks and...
Security. image by pixabay

By 2025, cyber attackers will have weaponized operational technology (OT) environments to successfully harm or kill humans, Gartner research firm predicts. OT is a...
cyber. image by pixabay

Deepfakes, an AI-based technology to create false content, have become easier than ever to make. The FBI suspects Russian and Chinese actors are using...
image by pixabay

Bypassing complex encryption has become a main goal and pursuit to State-actors and cybercriminals alike. It has never been more important to focus on...