Cyber Security

Cyber Security

Every year Kaspersky Lab experts evaluate the level of cyber-threats. In 2014 we saw considerable growth in the number of malicious attacks on user...

The August 2008 Baku-Tbilisi-Ceyhan (BTC) oil pipeline explosion in Refahiye, eastern Turkey, was ruled at the time to be an accident resulting from a...

The U.S. is weighing a “range of options” to respond to the hack of Sony Pictures, U.S. Homeland Security Secretary Jeh Johnson said recently....

Yoram Hacohen Three interesting processes are underway as a direct result of Edward Snowden’s revelations about the extent of the access by US security services...

U.S. intelligence agencies said they have concluded that the North Korean government was “centrally involved” in the attacks on Sony’s computers. This conclusion was leaked...

Cybercriminals are becoming more sophisticated and collaborative with every coming year. To combat the threat in 2015, information security professionals must understand these 3...

Several federal law enforcement and computer security officials told a Senate panel that increasingly sophisticated malware and other tools designed to infiltrate information systems...

The US Defense Department’s is poised to release a new cloud computing policy, opens the door for commercial firms to host military data and...

2015 will see an increase in Cyber Warfare incidents. McAfee Labs' 2015 Threats Predictions report sees increased cyber-warfare and espionage, along with new strategies from...

The U.S. Justice Department is creating a unit within the criminal division to advise on electronic surveillance in cyber investigations and work with the...

The U.S. power grid is in the process of an enormous transformation into a smart grid – an advanced, digital infrastructure with two-way capabilities...

A senior FBI official said on yesterday that the agency has not confirmed widely held suspicions that North Korea is behind the unprecedented cyber-attack...

The United States Postal Service (USPS) stated that it has been the victim of “a cyber-security intrusion” exposing the employment records of more than 800,000 employees. The FBI is investigating...

With the number of malware attacks rising sharply in 2013, and an estimated 15 million mobile devices worldwide infected at any one time, the...

Iranian hackers have penetrated the computer networks of government agencies and major critical infrastructure companies in the United States and 15 other countries over...

By Rachel Ehrenfeld Countermeasures against hackers require transparency and full disclosure. But as long as board of directors are reluctant to acknowledge cyberattacks and refrain...

By Rachel Ehrenfeld Rising geopolitical tensions have led to a constant barrage of cyber hacking into the U.S. government, industries and businesses. The recent attack...

By Ayelet Frank Cyberattack on civil aviation – a genuine threat The recent incident to the Malaysia Airlines Flight MH370 is fueling the discussion of whether...

Register to iHLS Israel Homeland Security In this weekly report (2 December 2014): Chinese military officials have deployed a highly accurate laser defense system Private industry experts...

Analysis of Firsthand Experiences of the World’s Most Renowned Cybersecurity Forensics Teams Pinpoints Exploitation of Privileged Accounts as a “Signature” in Targeted Attacks. A new...

Another company has just announced joining as a partner in the CyberSpark Industry Initiative, a non-profit organization established to enhance government-private sector collaboration in Israel...

Cybersecurity experts believe that Russia needs to strengthen the protection of its nuclear power stations and other critical infrastructure facilities and systems from cyber...

Latest