Cyber Crime

Cyber Crime

cybersecurity

FBI Director Christopher Wray announced the Bureau’s new strategy for countering cyber threats in remarks at the National Cybersecurity Summit. The strategy, Wray explained,...
innotech expo

iHLS is proud to launch iHLS InnoTech Expo Tel-Aviv - Israel’s largest conference and exhibition for HLS and cyber technologies and innovation. The launch...
blockchain

Blockchain technology will contribute to securing the American dollar. A blockchain initiative to make the US Dollar more like Bitcoin has been funded by...
quantum computing

Quantum computing is still in a development stage but it is expected to accelerate us into the future by impacting the landscape of artificial...
hardware vulnerabilities

About 70 percent of all cyberattacks are due to hardware vulnerabilities. The US Defense Advanced Research Projects Agency (DARPA) has developed a new generation...

A cyber attack on nuclear data is one of the highest concerns of states. Cyber threats to nuclear materials, facilities, command, control and communications...
money laundering

Gaming and other online platforms with many players could be the next money laundering platform. This has been revealed in a public inquiry into...
cybersecurity

By Or Shalom, security and cyber expert and adviser The establishment of a work plan in the cyber field is not a simple task. Alongside...
cyber crime

A new IAI project in Singapore will help solve digital and cybercrimes. Israel Aerospace Industries, ELTA's Singaporean Cyber Subsidiary, Custodio Technologies, together with Singapore’s...
ransomware

A public health district in Illinois paid hackers a $350,000 ransom after facing a ransomware attack, an attack in which hackers lock up a...
phishing

A booming success rate in COVID-19 related phishing attacks. Phishing is a type of social engineering attack often used to steal user data, including...
organized crime

A man was recently charged in a UK court with making false ‘medical kits’ alleged to treat Covid-19. The kits allegedly contained harmful chemicals....

By Or Shalom Providing cyber defense to financial infrastructure and assets is complex, as these systems and infrastructures are usually situated in the public space....

Quantum computers are expected to supply the most powerful computing capabilities ever. Advances in quantum computing are finally beginning to reach commercial applications, such...
mobile cybersecurity

The mobile devices we use for nearly every aspect of our lives are vulnerable to attackers.  In fact, 88% of organizations worldwide experienced targeted phishing...
cybersecurity

RSA 2020 annual information security conference held in San Francisco during the last week of February focused on the Human Element in cybersecurity. Rohit...

Many people use simple and weak passwords for their devices, making it easy for intruders to hack their phones, computers, emails etc. Many employees...
cybersecurity

During the last few weeks, the media headlines kept us informed about the triple data leak from the Elector application - an app developed...

Facial-recognition technology, which matches photos of unidentified victims or suspects against enormous databases of photos, has long drawn intense criticism from privacy advocates. Now,...

Hackers are trying to take advantage of the Coronavirus fear with the goal of delivering malware and stealing information. The World Health Organization (WHO)...

Researchers from Ben-Gurion University of the Negev in Israel have figured out a way to steal information from an isolated computer not connected to...

Managing sensitive financial information and combating cyber threats are imperative for the safety and continuity of financial institutions. One of the major components of...

iHLS Events