Cyber Security

Cyber Security

Data security in critical energy facilities is a highly complex task. Various data systems provide a great deal of information which comes in diverse...

Private industry experts said they believe hackers in Eastern Europe devised the malware, and they said it seems ready to blow up across computer...

Agency networks should be able to not only continuously detect hackers and throttle their destructive tactics — but also robotically bounce back. “We’ve talked about the...

A majority of Internet experts think that by 2025, a major cyberattack will have caused widespread harm to a nation's security and capacity to...

Who should individuals be more concerned about – intelligence and espionage agencies or their own local cellular companies? In an expose on Verizon (NYSE: VZ),...

FBI Executive Assistant Director Robert Anderson speaks on cyber security during a joint FBI/U.S. Secret Service presentation before the Financial Services Roundtable that was...

 on Thursday clarified a statement he made earlier in the week that the FBI never conducts electronic surveillance without a court order, saying, "There...

In today’s virtual world, it is well-known that cybercrime can jeopardize our privacy, our economy, and even our national security. Less well-known is an...

iHLS Israel Homeland Security In this weekly report (21 October 2014): German intelligence: Turkey is working on its own nuclear program Gamers hacked US Army Apache simulator US...

A recent story in the Guardian (16.10.2014) reported that Justice Secretary Chris Grayling is promoting legislation according to which anyone indicted of internet 'trolling'...

Two of the UK's top cyber crime-fighters have accused financial institutions and other companies of failing to share information about cyberattacks because of 'mutual...

A senior Microsoft spokesman says that government surveillance has damaged trust in the cloud and in the company itself, pushing the latter to focus...

The Intelligence Advanced Research Projects Activity (IARPA) wants to crowdsource ideas for software that would make human speech recorded in noisy environments more easily...

In this weekly report ((14 October 2014)): Northrop Grumman unveils new reconnaissance UAV New American internet campaign ridicules militants Elbit's new head-mounted display for pilots Cyber attack across...

Part 2 The first part focused on the initial revelations of the cyber attack, the discovery of the malware (malicious software) by K-Mart’s IT-team and...

Sears (NASDAQ: SHLD) announced last Friday (Oct 10) some of K-Mart's outlets (out of at least 1,200 in the US alone), which is a...

With funding shrinking in many sectors of law enforcement, agencies are searching for new ways to operate affordably while maintaining quality standards. Police departments’...

Gamers targeting Apache helicopter simulators belonging to the US Army hacked into an Army network. Federal officials have indicted "Xbox Underground", a group of twenty-something-year-old...

The intelligence community is collecting more data than ever. But does that mean the intelligence gleaned from these massive new stores of data is...

In this weekly report (7 October 2014): Ebola as seen from space Domestic extremism Summit at the Whitehouse, Hackers unleash Shellshock bug New octocopter UAS Darpa looking into the...

Barely a few days after a government crackdown on a spyware manufacturer, comes the startling revelation that law enforcement agencies have been purchasing commercial...

Israel has invited India to be part of Prime Minister Binyamin Netanyahu’s latest pet project of national cyber defense authority. The PM extended the...

Latest