Cyber Crime

Cyber Crime

James Clapper, director of U.S. intelligence, and other senior intelligence officers, have warned Congress that the next phase of escalating online data theft will...

Britain’s intelligence service has uncovered a “sophisticated espionage operation” run by Islamic State extremists in Syria to hack into the email accounts of British...

Have you ever stopped to think why defense companies have a classified network to prevent cyber attack, whereas companies handling our critical systems -...

In light of numerous cyber attacks and security breaches, of which the attack on the American Office of Personnel Management (OPM) was perhaps the...

The Iranian cyber police officials have called Yahoo and Google cyber companies to co-operate with them for preventing online crimes, Defense World reports. Iran has...

Israel Aerospace Industries (IAI) was recently awarded a contract by the Israel National Cyber Bureau in the Prime Minister's Office, to establish an innovative...

If a hacker is capable of breaking in to our computer systems, with a little more effort surely they could disrupt larger targets as...

Cyber Security firm FireEye has published a report revealing that India has been the victim of an advanced capaign of cyber attacks over the...

IBM’s security division has published its security threats reports for the third quarter of 2015 which it pointing out to an increasing danger of...

Security leaks have reached an all-time high these days, and are causing great concern among financial advisors, business owners and consumers. Nowadays there are...

Cyber threats on countries around the world are a main issue to be dealt with on a daily basis. Every so often we report...

If you are a manager of a company, you should know that it is already under attack. Though not your fault, this is certainly...

In the past, wars took place only in the real world: Armies battled each other in the physical spaces while using guns, cannons set...

Department of Homeland Security (DHS) intends to create an automated information sharing platform where all “cyber threat indicators” would be collected and disseminated to...

Maxim Rupp, a information security researcher for the german company Cure53, has managed to penetrate the bimetric security of the Taiwanese company Chiuy Technology....

The modern military is heading step by step in a more tehcnological direction. With each day, as more experience is gained, technology is implemented...

Identifying the methods and strategies used by organized crime networks and individuals to avoid detection on the Darknet was the focus of a specialized...

FBI Director, James Comey, gave a speech at a conference recently held in Colorado, U.S., where he revealed that the country is well aware...

Unmanned aerial vehicles are being widely used both in the public space and most certainly in the military space. Mostly, the world’s armies use...

By Lior Mazor The year 2014 was a turning point for mobile applications, having surpassed all other softwares in accessing the internet from a personal...

Many people are afraid to fly. Most of them fear than the plane will suffer a malfunction they have no control over midflight, as...

The meaning of Internet of Things (IoT) is basically a connection of all apects of our lives, anything technological (and not technological) in our...