Israel, US, UK Increase Cyber Cooperation
Israel’s Ministry of Defence and the US Department of Defence agreed to increase cyber-defence cooperation between the two countries, according to Army Technology. Representatives...
Your Mouse Could Help Track You Online
The privacy focused Tor network has been a regular feature of the news in recent years, most recently with the confirmation by a US...
New Study Ranks Nations On Cyber Vulnerability
Damaging cyberattacks on a global scale continue to surface every day. Some nations are better prepared than others to deal with online threats from...
New Great Firewall Restrictions In China Could Backfire
China is bearing down on foreign press with a new rule banning all foreign media from publishing online. The new rule went into effect...
How to incorporate Big Data and data solutions in the security...
The amounts of data produced today at any given moment along with the ability the collect them, to process and analyze them into business...
Carnegie Mellon Tor Attack Confirmed
Despite repeated denials by the US government, a federal judge has now confirmed that Carnegie Mellon University (CMU) was commissioned by the government to...
Doodling Could Replace Text Passwords
Soon, you should be able to ditch your cumbersome mobile passwords, instead opting to use swiping gestures or doodling to log into your smartphone,...
The Israeli Startup: PSIM System to Help Infrastructures Stay Safe
Today critical infrastructures have to simultaneously manage complex facilities, limited resources, answer to government agencies, deal with a growing amount of disparate technologies and...
Coming Soon: Quantum Cryptography at 3D
Quantum entanglement is one of the weird properties of quantum mechanics. Two particles, once joined, behave in a mirror-opposite way even when separated by...
China Boosts Surveillance State Using (Not) Big Data
In a not surprising turn of events, China is employing ever more sophisticated technologies in its surveillance apparatus to allow authorities to profile and...
San Bernardino Shooter’s iPhone – “Dormant Cyber Pathogen”?
In a surprising plot twist in the ongoing legal saga of the San Bernardino shooter’s iPhone case, the local District Attorney Michael Ramos is...
DHS Opens Silicon Valley Outpost
The US Department of Homeland Security (DHS) has set up an outpost deep in Silicon Valley to have better access to exciting startups and...
A Revolution In IoT Security?
The Internet of Things, a vast network of sensor nodes and devices, is promising to revolutionise our lives. In many ways, it’s already here,...
ISIS Hackers Publish Police Officers’ Details, Call For Lone-Wolf Attacks
ISIS hackers have posted the personal details of U.S. officials online, encouraging the group’s supporters to carry out “lone wolf” attacks against them.
Newsweek reports...
This App Will Warn You If You’re About To Give Away...
Personal information theft is one of the greatest risk factors for users online. Malicious websites that install malware designed to steal banking credentials, phishing...
Defending Encryption? In France, It Could Start Costing you
A new French law would impose penalties and fines on smartphone manufacturers who refuse to hand over encrypted information to law enforcement in terrorism...
Is Israel ready to counter massive cyber attacks?
By ARIE EGOZI
The recent Ransom Cyber attacks on some of Israel's organizations have again focused the attention to the imminent threat.
Is Israel ready? Well,...
The Israeli Startups: Maximum Security in Minimum Effort
While organizations spend tens of billions of dollars every year to protect themselves from cyber attacks, the disturbing truth is that in most cases,...
How Do We Protect Communications Networks From Cyber Attacks?
In the complex realm of modern information security, communications networks are becoming increasingly larger and much more complex than in the past, creating a...
Want A Military-Grade Secure Smartphone?
The mobile-first organization is forced to operate in a new IT environment: compromised mobile devices, BYOD programs, and evolving cybercrime. Enterprises are struggling to...
The Israeli Startups: The Future Of Authentication Systems
Most current password security systems for the Internet are flawed. And it goes beyond the systems themselves: Passwords really are just an awful way...
McAfee: US Government Technologically “Illiterate”
The infamous John McAfee has lambasted the US government as being so technologically “illiterate” and so incompetent at protecting the country’s digital assets that...