Cyber Security

Cyber Security

Following its official announcement last Friday, admitting its database was hacked, Uber has been taking legal action. The transport solutions app is pursuing legal...
video

Register to iHLS Israel Homeland Security In this weekly Video report (March 3rd 2015): The international campaign against ISIS Bad Iran Deal in the Offing Innovative Face Recognition...

A surprise cyber attack on U.S critical infrastructure – an imminent scenario? Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11...

Cyber crime, aka e-Crime, presents a highly complex and sophisticated threat that has been evolving rapidly recently. The unfolding legitimate cyber world makes for...

Register to iHLS Israel Homeland Security In this weekly Video report (February 24th 2015): Israeli System Intercepts Cloud Stored Data US Marine Corps Wants New Unmanned Tank A...

The U.S. government is warning Lenovo users they must remove an adware (advertising-supported software) called ’Superfish’ from their digital platforms. The Department of Homeland Security...

The IDF is preparing for cyberwars to come. The Northern Command has recently inaugurated a cyber security array; the IAF has been practicing various...

Financial and terror experts are concerning about the ability to move cash around national borders could help ISIS fund attacks in the West. This...

DHS officials responsible for protecting federal civilian networks and critical industries from cyberattacks have recently referred to this issue. They said they are going...

British Prime Minister David Cameron: “This government is committed to ensuring the UK continues to be a leader in the multi-billion dollar cyber-security industry...

Desert Falcons - First known Arabic Cyber Espionage group attacking victims in Israel and the Middle East. Kaspersky Lab’s Global Research and Analysis Team has...

Kaspersky Lab discovers the ancestor of Stuxnet and Flame – powerful threat actor with an absolute dominance in terms of cyber-tools and techniques. For several...
video

Register to iHLS Israel Homeland Security In this weekly Video report (February 17th 2015): Cyber attacks on drones The Iranian nuclear crisis and the U.S. administration A new...

All a hacker needs to be able to break into your car is an iPad. This, according to a report which was recently released...

The story of Carbanak began when a bank from Ukraine asked us to help with a forensic investigation. Money was being mysteriously stolen from...

American companies welcome next year's budget for Cyber security. Massachusetts cyber security firms applauded President Barack Obama proposed $14 billion allocation toward cybersecurity initiatives...

According to research conducted by Kaspersky Lab and B2B International, users of Apple computers encounter cyber threats just as often as the users of...

Kaspersky Lab Achieves VMware Ready - vCloud Air Status under Access Tier in vCloud Air Air ISV Program. Kaspersky Lab announced today that Kaspersky Anti-Virus...

Experts caution against the so-called digital electronic “Internet of Things” (IoT). Along with “Smart Grid Technologies” it "could fully eviscerate privacy". Does technological innovation...

Top experts from Israel and abroad met today in the Israel Air Force Center in Herzliya for the Big Data 4 HLS Conference, organized...

Nowadays, everything is available at the palm of our hand. Nevertheless, these amazing capabilities, combined with our instinctive fear of the "Big Sister Syndrome"...

Oracle Java is of among the most popular software ever installed in personal users’ systems in the US. In 2014, Java was installed on 65 percent...

Latest