Cyber Crime

Cyber Crime

smart cities

We are in an era of intelligent and urgent urban innovation. Our homes are connected, our streets are thriving labyrinths of interconnectivity, and our...
data breach

More than 87GB of passwords and email addresses have been leaked and distributed in a folder dubbed "Collection #1" by hackers in a significant...

Summary of 2018 2018 has begun with a recovery from the events of 2017 such as WannaCry, Petya, and the information leak from Equifax -...

Vehicle software is continuously gaining sophistication, creating new threat vectors in the process. As autonomous and connected vehicles become software driven, risks increase that...

In order to protect mobile devices and applications, US Federal agencies need security capabilities that proactively protect devices against all types of cyber attacks,...
two-factor

In a quest to make online accounts safer, many services now offer two-factor authentication. Cybersecurity professionals have advised enabling two-factor to add an extra...
data breaches

Data breaches compromised the personal information of millions of people around the globe in 2018. Data breaches are...

Advances in technology also have a darker side. The world relies on encryption to protect everything from credit card transactions to databases holding health...
IOT security

Cloudflare, the internet infrastructure and networking giant, has been expanding its focus to include mobile privacy and the security of connected devices. On November 11,...
bluetooth chip

Wireless access points can come in many forms, such as a router or an internet of things device. If a hacker gains access to...
cyber

The recent wave of ransomware attacks and preceding waves of cyber breaches could make it appear as though cyber criminals want their pay-off immediately....
5g network

5G wireless network deployments at major world events such as the 2018 Winter Games in PyeongChang have shown the great potential of a 5G-driven...
nuclear

A scary yet realistic scenario in the digital age could involve the following: attackers, sponsored by a rogue organization or radical state, gain access...
Cryptomining

Author: Aryeh Danon, Data Security Department Manager at Abnet Communications, distributing Sophos solutions in Israel. Hackers have discovered a new way to take advantage...
cyber attack

All US weapons that the Department of Defense tested between 2012 and 2017 have “mission critical” cyber vulnerabilities, claims a new report from the...
Router

Securing our routers and ensuring they are safe and protected is sometimes neglected by many. It is essential to check your router settings and...
IoT

Cybersecurity is an ongoing concern for many, especially with the proliferation of Internet of Things (IoT) technologies. The importance of securing IoT is increasingly...
Internet

Facebook has recently been in the spotlight for a security breach that compromised over 50 million accounts. This is a concern not only to...
iot security

In 2017, there were about 20 billion connected devices worldwide, according to Statista, which projects that the number will be more than 75 billion...

By Ilan Segelman, Power Communication (distributing Sophos solutions in Israel) Revealing private and secret information to unauthorized sources is an ever headline-grabbing issue. The Authority for...
internet's routing

The internet is essential to the exchange of all manner of information. It is not a single network, but rather is a complex grid...
blockchain

Once again, the retail giant Wal-Mart is using blockchain in order to increase effectivity and security. After it was awarded patents for a crypto-powered...

iHLS Events