Cyber Crime

Cyber Crime

big data

Most large organizations have billions of security-related logs per day and security analysts need to be able to automatically and intelligently parse critical data...
video systems

By Dorit Guterman, Ledico Security Systems, Tomer Nuri, Team Information and cyber security events can occur also via security cameras and other IoT devices. As result,...
Olympics

The Winter Olympics will take place in South Korea during February, and the country is planning to deploy 10,000 police officers in and around...
security flaws

Hackers now have a growing number of avenues by which to access personal information, and securing that information will only become more and more...
cyber capabilities

The recent protests in Iran and the regime’s attempts to block them shed light also on Tehran’s cyber capabilities. Offensive cyber operations have become...
cybersecurity

Blockchain technology has recently caught the world's attention because of the central role it plays in enabling cryptocurrencies. It enables secure information transmission on...
cyberattacks

What were the major trends in the global cyberspace during 2017? According to a report by Clear Sky Cyber Security, the main attacks were...
smartphone password security

New study from Nanyang Technological University, Singapore (NTU Singapore) has found a new security breach that hackers could use to guess your phone's PIN...
terrorist groups

As the bitcoin concept gains more and more supporters around the globe, there are concerns that this digital currency considered a highly secure method...
internet of things

As IoT adds more and more devices to the digital fold every day, organizations of all types and sizes are recognizing IoT's potential to...
ransomware

Rapid technology innovation caused companies across industries to rethink how they leverage digital tools such as artificial intelligence (AI), machine learning, augmented and virtual...
cyber-security

If recent years could be defined with one thing, it would probably be the giant technological leap forward. With the benefits come difficulties, and as...
applications

With surging demand for applications, IT departments are facing increased pressure to deploy them more rapidly, leading to increasing complexity of their infrastructures, and...
iot security

While IoT devices and the data they collect and transmit present enormous benefits to consumers and industry, the relative insecurity of many devices presents...
dual-use technologies

Lawmakers in the European Union have advanced plans to subject hacking tools to export controls currently reserved for depleted uranium, human pathogens and other...
cybercrime

As cybercrime continues to escalate around the world, defenders from both the public and private sectors must meet the threat with equal force. Global...
ransomware attacks

Ransomware attacks have become more and more common, attracting more global focus. Rob Wainright the head of the Europol, the European Union Agency for...
iot devices

The Internet of Things (IoT) ecosystem includes a broad variety of devices and device-systems such as power plants, vehicles, home appliances, etc. Its global...
cyber security

As the frequency and sophistication of cyber-attacks continuously increase, governments and critical infrastructure providers face significant challenges. A cyber security solution designed for customers...
hacking

The US government has recently issued a rare public warning about hacking campaigns targeting energy and industrial firms. The Department of Homeland Security and...
airport

Heathrow Airport’s secret security planning has been revealed in files on a memory stick found in a London street. The documents outline routes and...
blockchain

More and more industries have been discovering the blockchain technology advantages in the field of enhanced security against hackers. Blockchain is a secure database...