Cyber Crime

Cyber Crime

battery charging. image by pixabay

Wi-Fi devices are always connected to each other, even when they appear to be idle or are not connected to the same network. Using...
Cyber Security. image by pixabay

According to Netwrix, these following cyber security trends will be key as we enter 2023: Professional Cybercrime - an expansion of cybercrime for hire. In...
Image provided by pixabay

Researchers found new critical vulnerabilities in various automotive giants such as Tesla, Ferrari, BMW, Toyota, and others. The researchers found a compromise in a...
Cyber security. image by pixabay

For 2023, we must be more prepared to face the ever-growing cyber threats against us. Major corporations and company have been hit by cyber-attacks...
cyber security. image provided by pixabay

Once digital property gains value in the virtual world, the risk of cyber-attacks, hacking, theft, ransomware and phishing will noticeably increase without proper cyber...
cyber. image provided by pixabay

Recently, a report published by the US Department of Interior following an investigation by the Inspector General has showcased that 21% of the entire...

Cybercrime is on the rise, and that isn’t a notion that can be disproven. During the first quarter of 2022 there were 404 publicly...

One of the most infamous ransomware groups has recently issued a formal apology after it carried out an attack against Toronto’s Hospital for Sick...
ransomware. image provided by pixabay

Researchers from NCC Group counted 198 successful ransomware campaigns in July – up 47 percent from June. Sharp as that incline may be, it...

On August 25, 2022, LastPass published an official statement notifying customers that a third-party gained unauthorized access to portions of their development environment, source...

Cyber crime costs in 2025 are expected to reach $10.5 trillion in 2025 with some industries being more vulnerable to cyber attacks than others,...
Cyber attack. image by pixabay

Last year marked a turning point in the fight against ransomware as the collaboration among law enforcement agencies led to high-profile arrests, and the...
robot. image by pixabay

Based on a published NCC (National Computing Center) whitepaper, the growing number of organizations creating and deploying machine learning solutions is highly concerning. The...
Hologram VR. image by Pixabay

In February 2022, Gartner predicted that 25 percent of people will spend at least one hour per day in the metaverse by 2026. Backed...
security. image by pixabay

With the world of security constantly changing and hackers adapting to those changes, nothing is perfect in terms of security. While two-factor authentication is...
cybercriminals targeting profit

While deep learning algorithms may be looking promising for identifying and characterizing cybersecurity intrusions, various attacks can cause them to provide inaccurate information, or...
communications

If you think your smartphone is safe as long as no one touches it, you are wrong. While yes, many attacks on smartphones require...
Cyber Security. image by pixabay

Google has discovered a new commercial spyware that exploits vulnerabilities in Google Chrome, Mozilla Firefox, and Microsoft Defender. The Google Threat Analysis Group (TAG)...

By: Or Shalom, HLS expert OT networks are continuing to pose a security risk for cyber security personnel. In addition to routine attacks, ransomware attacks...
automotive. image by pixabay

The autonomous, connected, electric and shared (ACES) trends bring new requirements that modern automotive operating systems need to be capable of handling. The growing...
mobile-phones. image by pixabay

The Israeli Minister of Communications Yoaz Hendel has announced that the Ministry of Communications has begun its' efforts to put an end to the...
spyware. image by pixabay

Researchers at the Indian Institute of Technology Madras have developed an innovative algorithm to mitigate disruptions in critical networks such as air traffic control...