Supporters of Islamic State have at least 46,000 Twitter accounts

0
Supporters of the terrorist group, Islamic State of Syria and Iraq, popularly known as ISIS, used at least 46,000 Twitter accounts from September through...

NSA Surveillance Software Infecting Thousands of Computers Worldwide

0
A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according to a report from...

Cyberespionage tactics

0
Kaspersky Lab reveals latest cyberespionage tactics: complexity and modularity VS functionality. Nation-state sponsored cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex,...

A new threat: North Korean cyber attack on Western critical infrastructure

0
North Korea is targeting infrastructure in the west by Cyber attacks. According to various reports, North Korea has a team of roughly 3,000 cyber soldiers....

Air Traffic Control System Vulnerable to Cyberattack

0
The country’s air traffic control systems are vulnerable to hackers. This, according to a 42-page document entitled "Information Security: FAA Needs to Address Weaknesses...

Dangerous Apps

0
No less than six new malware are born each second. This, according to a recent report on various cyber threats. The report focuses on the...

Smartphone vs. Big Brother

0
We are all understandably ’hysterical’ about maintaining our privacy. There is no doubt this is a burning, crucial issue. Nevertheless, we ought to bear...

iHLS TV Weekly Video Report – March 10th 2015

0
Register to iHLS Israel Homeland Security In this weekly Video report (March 10th 2015): Cyber in the IDF: Warfare and Security Terrorism Finance: Experts Worry ISIS Already...

Pentagon to Spend Much More on Cybersecurity

0
An extra $400 million next year for cyber security projects in the U.S Leaders of the U.S. Department of Defense (DoD) plan to boost their...

The threat: ‘Armageddon’ cyber attack on banks

0
This threat is an imminent - and the U.S is not ready. A New York financial regulator recently said he is considering new rules to...

The CIA will increase its cyber operations

0
Cyber warfare is a growing an imminent threat on the U.S. The Central Intelligence Agency (CIA) is planning to join the growing list of...

France calls social media to help against terrorism

0
The French government has asked leading social media and tech firms, Google, Facebook, and Twitter to work directly with French law enforcement agencies in...

Uber cyber hacked – the repercussions

0
Following its official announcement last Friday, admitting its database was hacked, Uber has been taking legal action. The transport solutions app is pursuing legal...

iHLS TV Weekly Video Report – March 3rd 2015

0
Register to iHLS Israel Homeland Security In this weekly Video report (March 3rd 2015): The international campaign against ISIS Bad Iran Deal in the Offing Innovative Face Recognition...

Is a cyber-Pearl Harbor likely?

0
A surprise cyber attack on U.S critical infrastructure – an imminent scenario? Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11...

Technology’s answer to e-crime

0
Cyber crime, aka e-Crime, presents a highly complex and sophisticated threat that has been evolving rapidly recently. The unfolding legitimate cyber world makes for...

iHLS TV Weekly Video Report – February 24th 2015

0
Register to iHLS Israel Homeland Security In this weekly Video report (February 24th 2015): Israeli System Intercepts Cloud Stored Data US Marine Corps Wants New Unmanned Tank A...

Department of Homeland Security urges Lenovo users to remove Superfish

0
The U.S. government is warning Lenovo users they must remove an adware (advertising-supported software) called ’Superfish’ from their digital platforms. The Department of Homeland Security...

Cyber in the IDF: warfare and security

0
The IDF is preparing for cyberwars to come. The Northern Command has recently inaugurated a cyber security array; the IAF has been practicing various...

Terrorism finance: experts worry ISIS already using Bitcoin

0
Financial and terror experts are concerning about the ability to move cash around national borders could help ISIS fund attacks in the West. This...

DHS to rely on big data to protect critical infrastructure, networks

0
DHS officials responsible for protecting federal civilian networks and critical industries from cyberattacks have recently referred to this issue. They said they are going...

Cyber-Security Threats: Joint Initiative Accelerates Development and Adoption of Mature Technologies

0
British Prime Minister David Cameron: “This government is committed to ensuring the UK continues to be a leader in the multi-billion dollar cyber-security industry...

Latest

Image by Unsplash

Game-Based Learning Shaping the Future of Online Fraud Awareness

0
As online fraud continues to rise, finding effective ways to educate people about e-commerce scams has never been more crucial. A recent pilot study...