Cyber Security

Cyber Security

A video that shows the beheading of American Steven Sotloff was delivered as a "second message to America" to halt airstrikes in Iraq, following...

At the Black Hat 2014 conference, Billy Rios of Qualys Security revealed details about several vulnerabilities he was able to find, most notably in...

In this weekly episode (02 Sep 2014): - NSA and its new tracking software - Undersea sensors - GHOST: The unmanned system - Domestic extremists - Ambulance drivers safety תוכנה...

Relations between Silicon Valley and Washington have never been easy, but the technology sector’s fury about hacking by the National Security Agency has company...

The United States government, like all of us, is trying to save a little cash and make its day-to-day operations a little more efficient. In...

An American Jihadist, Douglas Mccain, 33, was killed in Syria last weekend fighting for the ISIS extremists, he was killed in a battle with...

Forty years ago, a group of researchers with military money set out to test the wacky idea of making computers talk to one another...

The Pentagon has begun planning for air strikes to attack ISIS targets in Syria using both manned and unmanned aircraft. The US will first...

A review of counter-espionage and counter-terror intelligence agencies use to intercept suspects' cellular, data and internet activities

The National Security Agency is developing a cybersecurity machine that could detect and automatically counter attacks against U.S. computers by blocking access to American networks, according...

The North Atlantic Treaty Organization is expected to update its charter in September to address cybersecurity while leaving open the question of whether hacks...

Exiled leaker Edward Snowden strikes once more. In a new interview, he disclosed that the NSA caused a massive internet blackout in Syria following...

To many Americans, online eavesdropping by the U.S. National Security Agency is an outrage, a threat to privacy and freedom.  To some, it's a business opportunity. A small but...

Attacks on an electric facility and increased attention from regulators has fueled concern about safeguarding facilities. Cybersecurity leapt onto the list of the top five...

Recruiting and researching the hacker community could boost cybersecurity. Hackers can be tough opponents because the best of them share ideas online about new ways...

Beijing is not happy that Canada's government is naming and shaming Chinese hackers. The big news on the television and on the front page of...

A Russian crime ring has stolen 1.2 billion username and password combinations and more than 500 million email addresses. The records, discovered by Hold...

An online fraud campaign, which led to the theft of $500,000 from 190 victims in just one week, was detected by an organizations that...

The global cyber threat review conducted by CyberArk reveals: The recent reports regarding the NSA's activities, in addition to the wave of infiltrations into...

The United States Federal Bureau of Investigation (FBI) is infecting the computers of crime suspects with malware on a large scale to beat encrypted...

China is ramping up its campaign against Microsoft, following its ban in May on the installation of Windows 8 on government computers. According to ECT...

Issues and articles discussed in this report: A new IT security survey British lawmakers examine UAV market Smart Russian weapons may reach ISIS in Iraq New, life-saving Israeli...