Northrop Planning “Cyber Resilient” Next-Gen Jet

0
Defence manufacturer Northrop Grumman is tackling one of the biggest developing problems of fighter jets: cyber risk. Tom Vice, President at Northrop Grumman Aerospace...

Stuxnet Is Only The Tip Of The Iceberg

0
Stuxnet, the world-famous computer worm that destroyed Iran’s centrifuges at the Natanz uranium enrichment plant, was only one part of a much larger operation....

iHLS TV Weekly Video Report – February 17th 2015

0
Register to iHLS Israel Homeland Security In this weekly Video report (February 17th 2015): Cyber attacks on drones The Iranian nuclear crisis and the U.S. administration A new...

The Great Bank Robbery: the Carbanak APT

0
The story of Carbanak began when a bank from Ukraine asked us to help with a forensic investigation. Money was being mysteriously stolen from...

$170 Device Unlocks iPhone In Hours, Took FBI 4 Months

0
It took almost four months for the FBI to break into the iPhone used by one of the San Bernardino terrorists. Turns out, they...

Cyber Hackers Can Now Shoot Others’ Sniper Rifles

0
The modern military is heading step by step in a more tehcnological direction. With each day, as more experience is gained, technology is implemented...

Israeli system intercepts cloud-stored data

0
Nowadays, everything is available at the palm of our hand. Nevertheless, these amazing capabilities, combined with our instinctive fear of the "Big Sister Syndrome"...

The Third Scenario – Business Continuity Planning in the face of...

0
Our lives are interlaced in a gentle existence fabric that is usually balanced between everyday routine and special events.  Exceeding that precious balance due...

Want A Military-Grade Secure Smartphone?

0
The mobile-first organization is forced to operate in a new IT environment: compromised mobile devices, BYOD programs, and evolving cybercrime. Enterprises are struggling to...

Cyber attacks on drones

0
The number of missions unmanned systems are tasked with, as well as their diversity, is expanding each year. The roles they play include a...

New Trojan Horse Hiding In USB Devices Detected

0
A new torjan horse malware called USB Thief, which is virtually undetectable before and after penetrating the computer, was detected by ESET. The software...

Splunk Named A Leader In The 2013 Gartner Magic Quadrant For...

0
Often seen as inflexible, slow and failing to deliver on the promise of Security Information and Event Management (SIEM), the traditional SIEMs of yesterday...

The Flaws In The System: Fingerprint Biometric Security

0
Maxim Rupp, a information security researcher for the german company Cure53, has managed to penetrate the bimetric security of the Taiwanese company Chiuy Technology....

North Korea’s Paranoid Operating System Revealed

0
Two German researchers recently ran an analysis of North Korea’s homegrown operating system, Red Star OS. Turns out, Red Star mirrors quite closely the...

Cyber Threat Against U.S. Is Growing

0
FBI Director, James Comey, gave a speech at a conference recently held in Colorado, U.S., where he revealed that the country is well aware...

Protect your website against cyber attacks

0
by Lior Mazor Introduction Cyber war is an act of war, adopted by states as well as by Terrorist Organizations,  with the goal to penetrate and damage the opponents computerized systems or other vital systems that...

Quantum Computers Makes The NSA Worried

0
The US National Security Agency (NSA) has a serious concern: quantum computing. Last year, the NSA warned the general public that encryption algorithms that...

Want To See AnonGhost Attacks In Real-Time?

0
Today is April 7th, which is the day the hacking group AnonGhost declared it will launch continuous attacks against the state of Israel: OPIsrael...

Energy under Hacktivism threat

0
In a conference recently held in the state of Wyoming, U.S., an FBI official of the criminal and national cyber security squad said that...

Advantages and dangers of technological advancement in cars

0
In an age where technology occupies a more central place in our lives as each day passes, there’s no doubt that everyday life get...

26 Year Old Hacker Is Bringing Self-Driving Cars To The Masses

0
You may not know who George Hotz (aka geohot) is, but many have enjoyed the fruits of his labours. In fact, he is something...

Anonymous Declares War On Turkey

0
Turkey has been accused by a variety of sources of aiding and abetting ISIS. Some of the accusations include giving medical treatment to ISIS...

Latest

Image provided by pixabay

Data Breaches Are Connected to Mass Layoffs, Research

0
A research team from Binghamton University and the State University of New York explains the connection between mass layoffs and data breaches, theorizing that...