The "smart city" sounds like a digital utopia, a place where data eliminates first-world hassles, dangers and injustices. But there are some problems with...
Militaries across the world should urgently work to avoid the "unanticipated interaction" between individual AI systems, an electronic rights organisation has warned.
Targeted at the...
A ground-breaking research dubbed Faxploit, conducted by CheckPoint, unfolds the shocking dangers of the seemingly simple and technologically innocent fax machine. The daunting news...
Major data breaches are a near-daily occurrence. Cyberthieves have been obtaining billions of passwords and other sensitive personal information. Behavioral biometrics is a new...
The proliferation of IoT technology has resulted in hundreds of thousands of connected systems being embedded in many a city’s critical infrastructures, enabling city...
The satellite communications that ships, planes and the military use to connect to the internet are vulnerable to hackers that, in the worst-case scenario,...
Mobile devices contain access to all of our personal and corporate data. Eavesdropping is a prevailing threat among many on mobile phones, with technology...
Are fitness applications the new threat to military officers and Pentagon officials?
A recent memo from Deputy Defense Secretary, Patrick Shanahan, states the dangers of...
The Israel Airports Authority has recently established a special Cyber defense center in Ben-Gurion international airport.
The decision to establish the dedicated center was made...
The near-future battlefield will be characterized by the presence of Internet of Things: smart devices, soldier-worn sensors and unmanned aircraft will produce a nonstop...
Cyber attacks against IoT devices can cause considerable damages. The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has signed a...
Cyberattacks have become a potent threat to US organizations and infrastructure. There is also a renewed concern over the possibility of Russian-sponsored meddling in...
Information security and safety in Vietnam has been recently improved, however, potential risks remain, especially for small and medium-sized enterprises. Around 27% of recent...
Ransomware cyber attacks are intensifying in scale and sophistication, and the perpetrators are better at evading countermeasures. A recent NTT Security survey revealed that...
Bluetooth is a widely deployed platform for wireless communications between mobile devices. As opposed to WiFi, it is not based on a network connecting...
Security cameras are exposed to cyber threats, including information theft and privacy breaching. The cameras have become more and more vulnerable to breaches and...
Protecting against phishing attacks, in which malicious actors attempt to gain access to a user’s credentials (and then to systems and networks) through social...