Cyber Security

Cyber Security

The field of cyber warfare has brought about a paradigm shift in the old balance of power. Sheer force of numbers and financial and...

While Western powers are deeply engaged in debating the merits and dangers of encryption, Kazakhstan is leading the charge in bypassing the security mechanism...

Nearly half of enterprises are set to deploy Internet of Things (IoT) by the end of 2016, according to findings from 451 Research, an...

Avi Yariv At the Cyber and Regulation conference, which took place in the University of Haifa last week, special attention was given to the regulatory...

By ARIE EGOZI A big effort is being made to protect the Israeli aviation infrastructure from Cyber attacks. The threat is real and imminent. A cyber...

Daniel Ehrenreich Supervisory Control and Data Acquisition (SCADA) experts are well aware that there is no single measure ("no silver bullet") that provides absolute cyber...

The 13 November attacks on Paris have demonstrated that Western countries are not secure against the terrorist threat. One possibility keeping many awake at...

  In the old days of the home computing, malware - viruses, computer worms, and trojan horses - ranged from the relatively harmless prank to...

As we have previously reported, the Internet of Things (IoT) may be on the brink of changing our lives - but before that happens...

  Chinese state-sponsored hacking of US computer networks has been a frequent feature in headlines in recent years. In this case, Chinese cyber attackers have...

Medical devices may not be ever-present in headlines, but that does not mean no new developments in the field happen. Rather, in recent years...

Labour’s former Defence Secretary Lord Browne warns of severe risk to Britain’s nuclear deterrent unless “weak spots” are protected. If such security holes as...

Threats from terrorist organisations and belligerent states are numerous. They range from terrorist attacks, like we have seen in Paris, through offensive operations similar...

Ariel University is currently establishing a training center for cyber protectors based on technology by Cyberbit, a subsidiary of Elbit Systems. The center will be...

We have written before about China building its own secure smartphone ecosystem - including a homegrown operating system and even processing chips - all...

Improved security was touted as one of the main advantages of Windows 10 over previous versions, as well as Microsoft’s newly launched Edge browser...

You’d think that as an agency tasked with security, the Department of Homeland Security (DHS) would be for the challenge of maintaining its own...

In an effort to combat identity theft and fraud in the country, India is launching a new biometric database - the world’s largest. With...

For years digital security experts have worried over possible backdoors implemented into equipment manufactured at Chinese factories. Over the years there have been several...

The Internet of Things (IoT) is growing rapidly. The number of internet-connected devices is expected to hit 6.4 billion in 2016, and to surpass...

Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...

In a shocking breach of security, multiple police body cams manufactured by Martel Electronics have been found to be infected with one of the...