Cyber Security

Cyber Security

A special cyber security unit of the German Armed Forces (Bundeswehr) conducted its first offensive cyber operation abroad when it broke into an internal...

By ARIE EGOZI We don't see it but this danger is around the corner waiting to hit. A cyber attack on Israeli infrastructure may include air...

Britain's GCHQ security agency is considering developing a nationwide internet firewall to block malicious content and protect government networks from rocketing numbers of attacks,...

Fifteen years after 9/11, the spectre of terrorism remains a global threat and, in response, the University of Albany, New York, announced that it...

Department of Homeland Security (DHS) is offering more protections to help states secure voting systems during the November elections. DHS has recently stepped up...

It's no news that today institutes from all sectors, international banks to hospitals, are seeking for a complete cyber defense layer. Cyber DriveWare, which...

Researchers detected serious security flaws in fitness trackers. Many of the fitness trackers track via GPS the kilometers the user run, measure heart rate...

The US Defense Department is doubling down on its effort to build cybersecurity into the acquisition cycle as a means of better protecting defense...

iHLS in cooperation with Lighthouse, Israel’s largest startup center led by Amos Talmor, are joining the war against cyber-bullying and adolescent suicidality. The company...

SWIFT, the global financial messaging system, announced that a few of it's member banks have been attacked by hackers. SWIFT pressured them to comply...

With the outsourcing of microchip design and fabrication a worldwide, $350 billion business, bad actors along the supply chain have many opportunities to install...

The US Pentagon plans to reprogram $100 million toward uncovering cyber flaws in major weapon systems, according to budget documents cited by defensenews.com. Defense Department...

150 Federal cybersecurity professionals were asked to examine how agencies are using big data and advanced analytics to better understand cybersecurity trends and mitigate...
video

Researchers from the Ben-Gurion University of the Negev (BGU) have demonstrated that an unmodified USB connected to a computer with malicious code can be...

Only 30% of organizations are prepared for security risks associated with IoT (Internet of Things) devices, according to a new Tripwire survey of more...

France and Germany are insisting makers of encrypted messaging apps such as Telegram to help governments monitor communications among suspected extremists. Privacy advocates argue that...

US Department of Homeland Security Science and Technology Directorate (DHS S&T) is funding the development of a new Bitcoin analytics tool. As Bitcoin becomes...

The Unmanned Systems and Robotics AUS&R 2016 international convention has been attracting the attention of world’s leading states and defense industries, including the US,...

Cloud Connected Embedded Systems can be found in products such as wearable fitness monitors, home security systems, home automation systems, garage door openers, industrial...

IPM, an IT company, and ForeScout Technologies Inc., an agentless and Internet of Things (IoT) cybersecurity company, announced that they have partnered to deliver...

Enterprises continue to fail when it comes to protecting corporate data on mobile apps and devices, according to the Mobile Security and Risk Review,...

A mission form the Israeli Public Security Ministry recently visited  an emergency center in the US in order to learn more about methods to...

Latest