Could Your Brain Waves Be Hacked?

0
In light of numerous cyber attacks and security breaches, of which the attack on the American Office of Personnel Management (OPM) was perhaps the...
blockchain

Blockchain at The Service of Police and Armed Forces

0
Police and security agencies around the world have so far only taken an interest in blockchain – the distributed ledger technology behind cryptocurrencies like...
ISIS

How Dangerous is ISIS in The Cyber Domain?

0
The Islamic State group and other militant organizations have been creating precedents in terms of discussing cyber activities almost from the start. Most cyber...

Cyber Threats on Israel’s Air Traffic Control

0
By ARIE EGOZI We don't see it but this danger is around the corner waiting to hit. A cyber attack on Israeli infrastructure may include air...

Pentagon to Spend Much More on Cybersecurity

0
An extra $400 million next year for cyber security projects in the U.S Leaders of the U.S. Department of Defense (DoD) plan to boost their...

Cloud computing and web-born IT threats

0
Kaspersky Lab Achieves VMware Ready - vCloud Air Status under Access Tier in vCloud Air Air ISV Program. Kaspersky Lab announced today that Kaspersky Anti-Virus...
smart city

IoT and Smart City Vulnerabilities

0
The technological advancements posed by the Internet of Things (IoT) have far-reaching benefits for the cities who adopt them. Smart Cities such as Barcelona,...

Smart lights for environmental monitoring

0
Many cities around the United States have begun using LED lightbulbs in their street lamps in order to save energy and money, as the...
homeland security market

Significant Growth in Middle East HLS Market

0
The Middle East homeland security market is on course for significant growth. A recent study by Analysts Frost & Sullivan (F&S) says revenues are...

Civil Aviation Cyber Security Put to Test

0
The cyber security of civil aviation has been put to the test recently. A team of government, industry and academic officials successfully demonstrated that...

Brazil Put Its Military In Charge of Cyber Security

0
Brazil's military approach to cyber insecurity is consistent with a broader effort to find a role for the Brazilian armed forces in the 21st...

INSS Global Cyber Review – November 1st

0
Israel Israel counters a Chinese cyber attack Israeli Channel 2 TV News reported last Sunday Israel's counter-cyber terrorism unit managed to thwart a concerted cyber-attack and...

Turn off those Flashing Lights

0
Hacking Poses Real Danger to Aircrafts, warns expert. Flaws in in-flight entertainment (IFE) systems and satellite communications leave commercial, private, and military planes vulnerable to...

New technology protects drones from Cyber attacks

0
How to protect drones from Cyber attacks? This problem is at the heart of a worldwide effort. Engineering researchers from the University of Virginia (U....

A Strong Case For Strong Encryption

0
by Konstantin Bodragin A vocal and at times fierce debate over encryption has developed in recent months. On the one side are those proposing the...

MAGAL-S3 GOES INTO CYBER

0
Magal security systems announced that it is expanding its business proposition with integrated physical-cyber protection solutions. As part of this strategy, Magal acquires Websilicon...

INSS Global Cyber Review – September 15th

0
Israel Israel: Anonymous planned new cyber-attacks on Israel web sites AnonGhost, an affiliate group of the Anonymous hacker organization, was threatening Israel by planning new cyber-attacks...

Kaspersky Lab: number of corporate sector targets in 2014 has more...

0
Kaspersky Lab has undertaken a master review of the key events that defined the threat landscape in 2014. Among a range of security incidents, targeted...

Java poses the biggest security risks to PCs in US

0
Oracle Java is of among the most popular software ever installed in personal users’ systems in the US. In 2014, Java was installed on 65 percent...
cyber security rules

Cyber Security Rules for Autonomous Vehicles Set by UK

0
The United Kingdom has recently published a set of cyber security regulations, “Key principles of vehicle cyber security for connected and automated vehicles”. The...

U.S. will use a more assertive cyber defense posture

0
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding...
mobile apps

Securing Mobile Apps for First Responders

0
In emergency and disaster situations, mobile apps and devices enable public-safety professionals to receive and share critical information in real-time, which enhances the delivery...

Latest