Cyber Crime

Cyber Crime

Microsoft looks set to be found in contempt of court after defying an order from a US judge that it should hand over data...

In this Weekly Report (16 September 2014): Firefighting in Greece The Italian Army is evaluating an unlimited aerial surveillance system for real-time convoy protection ISIS plans to launch...

Israel’s wealthiest bodies, the banks and the credit companies, will save a fortune and grow fatter, but what about the security of Israelis’ financial...

To hear the FBI tell it, tracking down the secret server behind the billion-dollar drug market known as the Silk Road was as easy...

Espionage infrastructure planted in the computers of over 300 institutions, companies and government bodies in Germany, Austria and Switzerland for over a decade was...

The increasing sophistication and scope of cyberattacks on businesses – and the increasing damage such attacks are causing – have led to growing interest...

Just as it appeared the problems of HealthCare.gov had passed, the White House announced on Sept. 4 that the national health-care portal had been hacked. No...

Home Depot may have experienced a massive security breach, which affected an estimated 110 million people. Home Depot on Wednesday said it was investigating the possibility,...

A team of researchers, including an assistant professor at the University of California, Riverside Bourns College of Engineering, have identified a weakness believed to...

The FBI is investigating an alleged break-in to J.P. Morgan Chase & Co.'s computers. It appears as though the bank was the target of...

A video that shows the beheading of American Steven Sotloff was delivered as a "second message to America" to halt airstrikes in Iraq, following...

At the Black Hat 2014 conference, Billy Rios of Qualys Security revealed details about several vulnerabilities he was able to find, most notably in...

The United States government, like all of us, is trying to save a little cash and make its day-to-day operations a little more efficient. In...

An American Jihadist, Douglas Mccain, 33, was killed in Syria last weekend fighting for the ISIS extremists, he was killed in a battle with...

Articles and issues discussed in this week’s report: Chinese hacker indicted Flying cameras assist first responders in latest China earthquake Missouri police militarization Car safety: collision prevention system...

A Chinese national has been indicted in connection with an alleged computer hacking scheme to steal trade secrets from American defense contractors, federal prosecutors...

A Russian crime ring has stolen 1.2 billion username and password combinations and more than 500 million email addresses. The records, discovered by Hold...

Two security experts demonstrated how hackers can exploit cloud services to build money-mining botnets. Cloud computing is becoming the paradigm most abused by cybercrime, cloud...

The committee that investigated the world trade center disaster warns: the real double danger threatening the U.S. through both terrorist attacks and cyber attacks...

by Lior Mazor Introduction Cyber war is an act of war, adopted by states as well as by Terrorist Organizations,  with the goal to penetrate and damage the opponents computerized systems or other vital systems that...

Over the last day data stored on many Israeli internet servers has faced an attack called Distributed Denial-Of-Service (DDoS), resulting in extremely slow browsing...

Driverless cars have been developed by several companies in the U.S. According to the website "HomeLand Security News Wire", the FBI believe unmanned vehicles...