Cyber Security

Cyber Security

January 15th, 2014 Israel Hackers of the Islamic Cyber Resistance Group claim to have breached Israel Airports Authority computer systems The Islamic Cyber Resistance hacker group claimed...

"There are no magical solutions for terror, and there are no magical solutions for cyber attacks. These days, however, the situation can be improved...

Elta, an Israel aerospace industries (IAI) subsidiary, hired an Israeli hacking group to assist in the development of prototype cyber attack and cyber defense...

iHLS is proud to launch its new TV channel. In today's first show we highlight some of our main stories from recent days, with comments...

Recent cyber attacks on Middle East embassies were conducted using targeted e-mail messages. The e-mail subject was the Syrian civil war, in an effort...

Using the “wrong words” on the internet may put people in trouble, especially true in India. Use of words like 'attack', 'bomb', 'blast' or 'kill'...

Microsoft will stop supporting the Windows XP operating system in mid 2014. Java 6 applications will also stop receiving updates. This situation, according to...

The Washington post revealed that NSA is spending a great effort to build a quantum computer that could break most types of encryption. The NSA...

The U.S. Air Force plans to add 1,000 new personnel between 2014 and 2016 as part of its cybersecurity units. Silicon Valley Business Journal reports...

The volume of cyber attacks keeps growing: 91% of organizations worldwide suffered at least one cyber attack in 2013, with 9% being the victim...

Der Spiegel revealed that the TAO unit of NSA planted backdoors to access computers, hard drives, routers, and other devices from principal vendors. Germany’s Der...

Israel Iranian hackers claim to have extracted personal details of top Israelis army officers An Iranian linked hacker claimed to infiltrate the Israeli Defense Force (IDF)...

Security researchers at Ben Gurion University of the Negev’s (BGU) Cyber Security Labs have identified a critical cyber vulnerability in highly secure Samsung mobile...

Gamers beware: Kaspersky Lab experts have discovered that PC gamers around the globe were hit by a massive number of attacks in 2013. The...

This report covers two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever...

Informatica Corporation, a provider of data integration software represented in Israel by the Aman Group, announced Informatica Dynamic Data Masking support for Hadoop, which...

The NSA paid RSA $10 million to ensure a vulnerable encryption algorithm was used by default in RSA's BSAFE toolkit, this according to a...

CyberSeal – a member of the Magal Group – offers a comprehensive solution for protecting security networks on all levels. In addition, the company...

A trio of scientists have proved that they can extract a 4096-bit RSA key from a laptop using an acoustic side-channel attack that enables...

The Israeli Army must be put in charge of operations during cyber-attack emergencies, and in order to do that the IDF must establish a...

The 2014 Cybersecurity Innovation Forum, to be held 28-30 January 2014, at the Baltimore Convention Center in Baltimore, Maryland, will focus on the existing...

Israeli companies are working to develop a "Hack Safe" car. This effort comes at a time when there's a growing concern involving car hacking....