Cyber Crime

Cyber Crime

Many times, when mentioning technological advancements, it is in the context of making tasks easier for man to do and keeping his life safe....

U.S. Army War College in Carlisle, Pa. has grouped together the best minds on cyber in order to brainstorm and create a new defense...

The US Army is seeking to equip its cyber warriors with cutting-edge networking hardware, and it is going outside the traditional acquisitions system to...

In an age where technology occupies a more central place in our lives as each day passes, there’s no doubt that everyday life get...

Let us do a little experiment: Try to close your eyes and think of the number of people you know that don’t have an...

By Rachel Ehrenfeld Shutting down the background check system of the Office of Personnel Management employees will do little to prevent the abuse of millions...

Earlier this year a new malware was detected in Kaspersky company’s labs which spread and affected the company’s systems. Following this finding, the company launched...

In a conference recently held in the state of Wyoming, U.S., an FBI official of the criminal and national cyber security squad said that...

For some time now a wide and passionate debate is conducted in Israel regarding the Biometric databse the country plans to implement on its...

In light of several successful cyber attacks on U.S. goverment systems, it is clear that the issue of defence against cyber attacks isn’t at...

An Israeli Start-up company has found a solution to assist companies facing threats of cyber attacks into their databases and using the confidential data...

American goverment officials for the Department of Homeland Security chose Illinois University and its researchers to head a research program for developing and upgrading...

Critical national infrastructures are under constant threat that is increasing constantly because of three factores put together: Globalization, technological advances and the increase of...

While cyber hacks and attacks can cause massive damage to both economic and goverment factors, it’s not only sophisticated hackers that cause damage. In...

The IBM annual security survey for 2014 reveals that in that year the number of security related events that turned into full cyber attacks...

In response to growing threats of cybercrime and cyber attacks in recent years, a first-ever conference on this issue was opened  at the International Atomic...

Preventing malware attacks before they can happen has been a top priority for the Department of Homeland Security (DHS) Science and Technology Directorate’s (S&T)...

Skillful hackers’ cyber attacks are getting more and more common in today’s technological world. Just a few days ago, such an attack brought down...

Following reports on Israel’s involvment in planting a spy software in the hotels where the nuclear talks took place, I-HLS was given the professional...

Malcolm Frost, the United States Army  spokesman, admitted that a few days ago the official website of the Army was hacked. A group of...

In the last two months, there is an ongoing governmental investigation trying to figure out the identity and the way someone was able to...

The right for privacy or the general interest to safeguard the public's privacy – which one wins in case of a clash? After failing...

Latest