Cyber Security

Cyber Security

ISIS hackers have posted the personal details of U.S. officials online, encouraging the group’s supporters to carry out “lone wolf” attacks against them. Newsweek reports...

Personal information theft is one of the greatest risk factors for users online. Malicious websites that install malware designed to steal banking credentials, phishing...

A new French law would impose penalties and fines on smartphone manufacturers who refuse to hand over encrypted information to law enforcement in terrorism...

By ARIE EGOZI The recent Ransom Cyber attacks on some of Israel's organizations have again focused the attention to the imminent threat.  Is Israel ready? Well,...

While organizations spend tens of billions of dollars every year to protect themselves from cyber attacks, the disturbing truth is that in most cases,...

In the complex realm of modern information security, communications networks are becoming increasingly larger and much more complex than in the past, creating a...

The mobile-first organization is forced to operate in a new IT environment: compromised mobile devices, BYOD programs, and evolving cybercrime. Enterprises are struggling to...

Most current password security systems for the Internet are flawed. And it goes beyond the systems themselves: Passwords really are just an awful way...

The infamous John McAfee has lambasted the US government as being so technologically “illiterate” and so incompetent at protecting the country’s digital assets that...

In the field of cyber security, everyone has one main goal: staying ahead of the game. The hackers are constantly seeking out new avenues...

Defence manufacturer Northrop Grumman is tackling one of the biggest developing problems of fighter jets: cyber risk. Tom Vice, President at Northrop Grumman Aerospace...

SQream Technologies has opened a unique columnar Database based on the computerized power of GPU. This is the only columnar database today which allows...

US can’t be successful in banning encryption as it is a global phenomenon, according to Harvard study. Despite over two years’ efforts by the...

While each person might define it in different terms, Big Data is basically this: A collection of data from traditional and digital sources for...

Electronic warfare, espionage, and hacking are now a reality of everyday life. While most of us go about without giving a second thought to...

Stuxnet, the world-famous computer worm that destroyed Iran’s centrifuges at the Natanz uranium enrichment plant, was only one part of a much larger operation....

With the months long power outage in Crimea, the world saw how easy it is to leave an entire region with no electricity. Attacks...

The Internet of Things (IoT) - the myriad of internet-connected devices such as baby monitors, smart TVs, home security systems, and even smart dolls...

President Barack Obama’s administration released the presidential Cybersecurity National Action Plan (CNAP) this week. CNAP is an attempt to fix the broken federal information...

A rogue hacker group managed to penetrate the US Department of Homeland Security (DHS) secure network and make off with a database containing the...

This last summer Microsoft’s Internet Explorer was superseded by the shiny and new Microsoft Edge browser, and everyone rejoiced. The aging IE, fraught with...
video

During the World Economic Forum in Davos, Switzerland in January, Israeli Prime Minister Benjamin Netanyahu led discussions on the subject of cyber security, and...

Latest