Cyber Crime

Cyber Crime

45
Cloud service providers of US Federal agencies and government organizations must meets strict standards and requirements in order to achieve a trusted provider status. CloudPassage...

57
An IT expert points out at various cyber security threats in the shipping field. Frank Coles, the CEO of Transas, a developer and supplier...

57
DCI, a large French company that specializes in military training, consulting and technical assistance, recently completed a one-week training course to teach 12 trainees...

64
Efforts to combat hackers usually focus on one method of attack, but computer scientists at University of Texas Dallas have developed a strategy more...

43
Awareness of cyber attacks in the run-up to the U.S. presidential election helped grow the number of young adults more likely to pursue a...

72
  The Internet of Things (IoT) is an innovative field developing rapidly. In daily life it is about connecting computers and various smart devices such...

101
Metova Inc announced the launch of Metova Solutions, a provider of Military-grade cybersecurity technologies, training and hardware for corporations and institutions. Metova Solutions technology...

108
Security researchers have come across the source code for the Internet of Things botnet called Mirai. This botnet has been used to launch major...

96
Britain's GCHQ security agency is considering developing a nationwide internet firewall to block malicious content and protect government networks from rocketing numbers of attacks,...

81
Department of Homeland Security (DHS) is offering more protections to help states secure voting systems during the November elections. DHS has recently stepped up...

119
It's no news that today institutes from all sectors, international banks to hospitals, are seeking for a complete cyber defense layer. Cyber DriveWare, which...

159
Many of today’s automobiles leave the factory with secret passengers: prototype software features that are disabled but can be unlocked by clever drivers. In what...
video

308
Researchers from the Ben-Gurion University of the Negev (BGU) have demonstrated that an unmodified USB connected to a computer with malicious code can be...

164
A mission form the Israeli Public Security Ministry recently visited  an emergency center in the US in order to learn more about methods to...

126
Until not long ago China was reluctant to open to the developments in the Internet shpere. However, in recent years this country has been...

263
At the recent Black Hat hacker conference in Las Vegas, cybersecurity researchers showed how drones can help secure wireless networks and bulster cybersecurity. David Latimer,...

182
Ransomware attack is one of the scenarios that security experts have been worrying about regarding the widening use of the Internet of Things. It...

193
The web has many advantages for everyone, in every age, around the globe. But as always there are darker sides that can cause severe...

160
Bastille cybersecurity company unveiled a massive vulnerability affecting the vast majority of low-cost wireless keyboards. Using a new attack that Bastille has named “KeySniffer,”...

283
Before they’ve even started, the Rio Olympics are already plagued with numerous issues jeopardising the security of visitors, players, and residents alike. From the...

146
Large organizations (companies or agencies with more than 200 iOS or Android mobile devices) are almost guaranteed to have at least one malware-infected device,...

206
A US House of Representatives committee has voted to create a new agency under the purview of the Department of Homeland Security (DHS) that...

iHLS Events

5

1007