Cyber Security

Cyber Security

By Rachel Ehrenfeld Countermeasures against hackers require transparency and full disclosure. But as long as board of directors are reluctant to acknowledge cyberattacks and refrain...

By Rachel Ehrenfeld Rising geopolitical tensions have led to a constant barrage of cyber hacking into the U.S. government, industries and businesses. The recent attack...

By Ayelet Frank Cyberattack on civil aviation – a genuine threat The recent incident to the Malaysia Airlines Flight MH370 is fueling the discussion of whether...

Register to iHLS Israel Homeland Security In this weekly report (2 December 2014): Chinese military officials have deployed a highly accurate laser defense system Private industry experts...

Analysis of Firsthand Experiences of the World’s Most Renowned Cybersecurity Forensics Teams Pinpoints Exploitation of Privileged Accounts as a “Signature” in Targeted Attacks. A new...

Another company has just announced joining as a partner in the CyberSpark Industry Initiative, a non-profit organization established to enhance government-private sector collaboration in Israel...

Cybersecurity experts believe that Russia needs to strengthen the protection of its nuclear power stations and other critical infrastructure facilities and systems from cyber...

The State Department’s unclassified email system was compromised in recent weeks, at the same time as a White House network, and officials took the...

This report covers the period of April - June 2014, the report covers two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics...

U.S. intelligence agencies have designated cyberattacks as the most alarming threat to national security. The federal government is spending roughly $10 billion a year to...

Lockheed Martin is among the participants at the upcoming Autonomous Unmanned Systems & Robotics Expo on November 25-26 2014 US Army Central Intelligence is examining a...

ThetaRay is among the presenters at the upcoming Autonomous Unmanned Systems & Robotics Expo on November 25-26 2014 The following is a realistic scenario, not...

iHLS Israel Homeland Security In this weekly report (18 November 2014): Low-cost Ebola sensor Self-healing computers: next step in fighting hackers The Chinese civilian UAV market Morocco to assist UAE...

In a recent C-SPAN interview by Mary Jordon from the Washington Post, Dr. Arati Prabhakar, director of the Defense Advanced Research Projects Agency (DARPA), conducted stated:...

Anonymous operatives have been terrorizing police officers, officials and residents over the past three months. The first call came on a Thursday, 12 days after...

In this day and age, when IoT (Internet of Things) is fast becoming a key feature of everyday life, any malicious strike and intentional...

iHLS Israel Homeland Security In this weekly report (11 November 2014): The National Cyber Investigative Joint Task Force: NCIJTF New UASs: SpyLite mini and BlueBird Raytheon is testing a new laser-guided...

Data security in critical energy facilities is a highly complex task. Various data systems provide a great deal of information which comes in diverse...

Private industry experts said they believe hackers in Eastern Europe devised the malware, and they said it seems ready to blow up across computer...

Agency networks should be able to not only continuously detect hackers and throttle their destructive tactics — but also robotically bounce back. “We’ve talked about the...

A majority of Internet experts think that by 2025, a major cyberattack will have caused widespread harm to a nation's security and capacity to...

Who should individuals be more concerned about – intelligence and espionage agencies or their own local cellular companies? In an expose on Verizon (NYSE: VZ),...