Cyber Security

Cyber Security

iHLS is on the process of founding a unique fund which will make investments in start-ups at the security technology and homeland security sector....

3D printing is a new emerging technology with applications at the civilian and military production. However, it has some cybersecurity and other implications that...

Power grids and utility SCADA systems may be volneruable to a variety of threats, including cyber attacks.  might be a target to such attacks....

It seems that Israel’s increased capabilities in the field of cyber have been recognized also in Asia. Israel Aerospace Industries (IAI) announced signing significant...

Before they’ve even started, the Rio Olympics are already plagued with numerous issues jeopardising the security of visitors, players, and residents alike. From the...

Large organizations (companies or agencies with more than 200 iOS or Android mobile devices) are almost guaranteed to have at least one malware-infected device,...

We have recently written about the mind staggering fact that the Pentagon still uses floppy disks to perform nuclear missions. This new story is...

In the event of a catastrophic cyber attack on civilian infrastructure, the US military’s Cyber Command is one of the first and major lines...

ISIS is well-known for its extensive use of technology and social media in the organisation’s efforts to fill its ranks. But have you ever...

The US Department of Homeland security has issued a warning the thousands of industrial energy systems can be remotely hacked. These internet-connected systems rely...

“Lone wolf” terrorist attacks are becoming the new normal. These individuals, almost unconnected to larger organisations, are hard to find, monitor, and apprehend on...

Cloud computing has brought about a new age of convenience. You can store massive amounts of data, share it easily, and most technical aspects...

Not to be left behind, NATO has now designated the cyber domain as a new frontline. Cyber attacks, the defence organisation contends, are now...

The NSA wants to monitor and collection information from pacemakers and other biomedical devices for national security purposes, The Verge reports. The idea, it...

The so-called Cyber Caliphate, the supposed cyber army of jihadist organization ISIS, has featured prominently in the news in recent years with a string...

Israel and the United States have recently signed a cyber defense declaration calling for real-time operational connectivity through respective Computer Emergency Response Teams (CERTS)...

A US House of Representatives committee has voted to create a new agency under the purview of the Department of Homeland Security (DHS) that...

Is there anything the US National Security Agency can’t do? It can tap undersea fibre optic cables in real time, track the locations of...

Terrorists could soon bring a major city to a standstill with a click of a button, warns Robert Hannigan, director of the UK’s Government...

Under EU law, citizens have the “Right to be Forgotten,” whereby they can petition internet search providers such as Google to remove search results...

Israeli startup firm CTERA Networks has won a tender to provide a private cloud system for file sharing to the US Ministry of Defense....

The Obama administration is seeking to expand the investigatory powers given to the FBI and amend surveillance legislation to give the Bureau explicit authority...