Cyber Crime

Cyber Crime

cyber

146
  The Russian government has long been known to use criminal hackers for its’ world-class hacking abilities and intelligence gathering. The criminal group most likely...
cyber security

99
By Or Yaacov,  EMEA Information Security Solutions Architect, F5 The DDoS attack on the OVH hosting company in September 2016, that used breached IoT devices,...
cybersecurity

79
The Canadian Institute for Cybersecurity opened at the University of New Brunswick (UNB) recently with more than $4.5 million in funding and the establishment...
cyber security

142
  Banks and financial institutions are the most favoured target for cyber criminals. Reports by various internet security firms show that the majority of the...

157
Recent Russian cyber attacks against US targets have raised the concern of the US Department of Homeland Security (DHS).  A critical infrastructure may be...

106
The version of destructive computer virus Shamoon was being employed to attack computers in Saudi Arabia and other regions in mid-November, as revealed by...

56
The US Defense Department announced recently that the Pentagon has approved hackers to test the cybersecurity of its public websites without fear of prosecution....

142
Ixia, a provider of network testing, visibility, and security solutions, announced recently that the company’s threat intelligence gateway (ThreatARMOR) will now include cloud-powered centralized...

77
Attivo Networks, an award-winning firm in cyber security threat detection, announced recently that it has been named a Platinum Award winner in American Security...

92
Germany's cabinet approved a new cyber security strategy due to a growing number of attacks, especially from China and Russia. The strategy calls for the...

163
Researching vehicular cybersecurity and its role in future law enforcement was the focus of the first part of a project carried out as a...

95
Rostec, the Russian state arms contractor, has launched its own anti-hacking center to deal with attempted cyberespionage attacks, the company’s IT subsidiary RostecInform (RT...

300
Virtual criminal activity started as early as the 1970s. In 1984, the first computer forensics program, Magnetic Media, was created by the FBI to...

98
By Gad Elkin, Information Security Director in F5 In the film “Ransom”, Mel Gibson plays the role of a father who is trying to save...

176
Chinese hackers have recently launched a network attack for targeting people attending a US-Taiwan Defense Industry Conference. The conference was attended by defense officials,...

100
Following recent reports of cyber attacks by major international players like China and Russia, the UK has decided to take it’s cyber security abilities...

143
CounterTack, the cybersecurity company, recently announced that it’s endpoint detection and response (EDR) security technologies are now available worldwide as a new managed EDR...

224
The coordinated cyber attack that crippled parts of the internet on October 21 highlighted key policy problems, a Stanford cybersecurity scholar said. Herbert Lin, a...

101
According to recent reports, the Australian government networks are at risk of cyber-attacks. previous incidents include foreign spies had hacking into the Bureau of...

67
A major cyber-attack that used hacked smart devices such as web cameras managed to shut down high-profile websites including Twitter, Spotify and PayPal, as...

67
The University of Connecticut’s (UConn) School of Engineering and Synchrony Financial, a consumer financial services company headquartered in the state, have announced earlier this...

45
Secretary of the National Security and Defense Council of Ukraine, Oleksandr Turchynov discussed at a meeting with the Romanian Minister of National Defense, Mihnea...

iHLS Events

5

1009