ISIS hackers have posted the personal details of U.S. officials online, encouraging the group’s supporters to carry out “lone wolf” attacks against them.
Newsweek reports...
Personal information theft is one of the greatest risk factors for users online. Malicious websites that install malware designed to steal banking credentials, phishing...
A new French law would impose penalties and fines on smartphone manufacturers who refuse to hand over encrypted information to law enforcement in terrorism...
By ARIE EGOZI
The recent Ransom Cyber attacks on some of Israel's organizations have again focused the attention to the imminent threat.
Is Israel ready? Well,...
While organizations spend tens of billions of dollars every year to protect themselves from cyber attacks, the disturbing truth is that in most cases,...
In the complex realm of modern information security, communications networks are becoming increasingly larger and much more complex than in the past, creating a...
The mobile-first organization is forced to operate in a new IT environment: compromised mobile devices, BYOD programs, and evolving cybercrime. Enterprises are struggling to...
Most current password security systems for the Internet are flawed. And it goes beyond the systems themselves: Passwords really are just an awful way...
The infamous John McAfee has lambasted the US government as being so technologically “illiterate” and so incompetent at protecting the country’s digital assets that...
Defence manufacturer Northrop Grumman is tackling one of the biggest developing problems of fighter jets: cyber risk. Tom Vice, President at Northrop Grumman Aerospace...
SQream Technologies has opened a unique columnar Database based on the computerized power of GPU. This is the only columnar database today which allows...
Stuxnet, the world-famous computer worm that destroyed Iran’s centrifuges at the Natanz uranium enrichment plant, was only one part of a much larger operation....
The Internet of Things (IoT) - the myriad of internet-connected devices such as baby monitors, smart TVs, home security systems, and even smart dolls...
President Barack Obama’s administration released the presidential Cybersecurity National Action Plan (CNAP) this week. CNAP is an attempt to fix the broken federal information...
This last summer Microsoft’s Internet Explorer was superseded by the shiny and new Microsoft Edge browser, and everyone rejoiced. The aging IE, fraught with...
During the World Economic Forum in Davos, Switzerland in January, Israeli Prime Minister Benjamin Netanyahu led discussions on the subject of cyber security, and...