Cyber Security

Cyber Security

A report released on cyber security breaches in the Pentagon is probably what brought on efforts to improve security, as well as increasing collaborations...

The Obama administration and lawmakers are looking to South Korea to help thwart Pyongyang’s attempts to upgrade and strengthen its cyber capabilities. The country’s...

Last month President Barack Obama said that the U.S. would be “watching closely” to see if “words are followed by actions” after he and...

The last few weeks saw a number of financial companies become a target for cyber attacks and attempted blackmail using threats. The companies attacked...

A regional power devoted to ensuring its own survival, Israel has burgeoned into a high tech epicenter built around Internet security, anti-virus software, and...

ISIS is busy producing many videos to post online, trying to recruit more fighters to join its ranks, which is terrorizing Iraq and Syria....

The US, though used to leading in the military and intelligence fronts, has found itself in the past year at a disadvantage when it...

A study of the information security measures at civilian nuclear energy facilities around the world found a wide range of problems at many facilities...

Between August 1, 2014 and July 31, 2015, the Defense Department addressed 93 of 229 cyber recommendations, according to a summary of a new...

The European Court of Justice (ECJ) in Luxembourg has ruled that U.S. digital data storage systems fail to provide sufficient privacy from state surveillance. According...

The air force is always looking to take the lead with advanced technologies, in computers and electronics. Each day the air force’s technical divisions...

Today’s small wars and border conflicts are being fought online and under the radar, but the conflicts could escalate into real world wars. Last year,...

Everything around us is becoming “smarter”. Who of us hasn’t dreamt of turning on the boiler 15 minutes before we get home from a...

Voice biometrics is based on the assumption that each person has a unique voice that depends not only on his or her physiological features...

For most people, the term “cyber security” calls to mind stories of data theft like the recent hacks of the OPM database, or network...

Scottish researchers have developed an ultrasound sensor that is able to detect cracks and faults in buildings and facilities, such as oil pipelines and...

One of the things the United States has learned from the war in Iraq was to foresee the threat lurking around the corner. Soldiers...

Amidst all the excitement about the possible benefits of the Internet of Things, a slew of warnings have been sounded by IT pros, vendors...

In an era where most organizations run on electronic communications, it is not only executives and IT engineers who hold the keys to the...

They Look like the latest rage in jewelry and gadgetry, but like all computer devices, smart watches are vulnerable to hackers, say researchers at...

Russian president's official website was targeted by a massive hacker attack during country-wide local elections, but the Kremlin's cyber defenses managed to cope with...

James Clapper, director of U.S. intelligence, and other senior intelligence officers, have warned Congress that the next phase of escalating online data theft will...

Latest