Cyber Crime

Cyber Crime

communication encryption

The past few years have been rough on law enforcement agencies around the world. Online communication is encrypted most of the time, making it...
cyber

The cyber sphere has been gaining increased importance regarding the conduct of states, security organizations and the business realm. The vital need to secure...
cyber attack

By Arie Egozi This time the cyber attack was used for extortion. But it may go further, much further and cause huge catastrophes. Hackers exploiting malicious...
security breaches

Mobile phone apps have increasingly become vulnerable to security breaches. Virginia Tech researchers have recently discovered that the same apps we regularly use on...
iot security

Internet of Things - IoT security breaches have been dominating headlines lately. Even if you personally don’t suffer consequences of the mediocre security of...
cyber crime

Lockheed Martin will support the US Department of Defense's efforts against cyber criminals under a new contract. The company will continue its role as...
cyberthreats

The annual assessment of the biggest cyberthreats to U.K. businesses has been published recently, after being produced jointly for the first time by the...
cyber

In the near future, the cyber industry will have to cope with a wider array of cyber threats and challenges resulting from the vulnerabilities...
Cybersecurity

Following the recent New York Times report about what may be the largest leak of C.I.A documents in history on WikiLeaks, Michael Hill, a...
cybersecurity

A new cooperation agreement in the cybersecurity for organizations field offers an efficient response to the growing information security challenges. The cybersecurity company Experis Cyber...
digital identity

A national digital identity network is to be built in Canada. SecureKey Technologies and a Canadian non-profit coalition have received a grant from a...
cyber

  The Russian government has long been known to use criminal hackers for its’ world-class hacking abilities and intelligence gathering. The criminal group most likely...
cyber security

By Or Yaacov,  EMEA Information Security Solutions Architect, F5 The DDoS attack on the OVH hosting company in September 2016, that used breached IoT devices,...
cybersecurity

The Canadian Institute for Cybersecurity opened at the University of New Brunswick (UNB) recently with more than $4.5 million in funding and the establishment...
cyber security

  Banks and financial institutions are the most favoured target for cyber criminals. Reports by various internet security firms show that the majority of the...

Recent Russian cyber attacks against US targets have raised the concern of the US Department of Homeland Security (DHS).  A critical infrastructure may be...

The version of destructive computer virus Shamoon was being employed to attack computers in Saudi Arabia and other regions in mid-November, as revealed by...

The US Defense Department announced recently that the Pentagon has approved hackers to test the cybersecurity of its public websites without fear of prosecution....

Ixia, a provider of network testing, visibility, and security solutions, announced recently that the company’s threat intelligence gateway (ThreatARMOR) will now include cloud-powered centralized...

Attivo Networks, an award-winning firm in cyber security threat detection, announced recently that it has been named a Platinum Award winner in American Security...

Germany's cabinet approved a new cyber security strategy due to a growing number of attacks, especially from China and Russia. The strategy calls for the...

Researching vehicular cybersecurity and its role in future law enforcement was the focus of the first part of a project carried out as a...