DHS to rely on big data to protect critical infrastructure, networks

0
DHS officials responsible for protecting federal civilian networks and critical industries from cyberattacks have recently referred to this issue. They said they are going...

Iran Is Challenging IoT Security

0
As we have previously reported, the Internet of Things (IoT) may be on the brink of changing our lives - but before that happens...

Could iPhone’s fingerprint sensor help kill off passwords?

0
The fingerprint sensor built into Apple's latest smartphone, which was unveiled on Tuesday, could signify the beginning of the end for the pesky password....
cybersecurity

Israeli Cyber Experts: What’s Behind the Cyberattack on Iran?

0
A cyberattack on Iran has disrupted the sale of subsidized fuel in Iran on October 26, causing the shutting down of a government system...

Silent War – Trojan Horse in China’s Service?

0
The ongoing dispute over the South China Sea has apparently spilled over into cyberspace recently, as hackers allegedly from China have attacked government and...
Images provided by pixabay

China is Boosting its Cyber Defenses in Fear of Cyberattacks and...

0
China reportedly intends to improve the data security of its industrial sector in order to effectively contain any “major risks,” a process that is...
image provided by pixabay

Have An Android Phone? You Might Be at A Higher Risk...

0
Android phones were exposed by experts as extremely vulnerable to cyberattacks, with almost 200,000 data tracking attempts made in just 30 days on a...

Solution Against GPS Jamming Required

0
US and allied GPS signals are under an increasing threat of enemy electronic warfare jamming attempts. A new US Air Force initiative addresses this...
Photo illust Pixabay

European Unmanned Technology Launched

0
A European consortium submitted an application for a multi-mission unmanned ground system capable of being teamed with manned and aerial vehicles. The system will...
image provided by pixabay

Lightning Never Strikes Twice? Ransomware Attackers Seen Regularly Repeating Previous Attacks

0
Cybersecurity company Cybereason reveals that the actual price of a ransomware attack on a business includes much more than the ransom itself. When choosing whether...

INSS Global Cyber Review – December 15

0
Israel Israel and Italy signed an agreement on cyber security cooperation Israel and Italy signed an agreement for future cooperation in cyber security. It is the...

Law Enforcement and National Security vs. Global Business Interests

0
Yoram Hacohen Three interesting processes are underway as a direct result of Edward Snowden’s revelations about the extent of the access by US security services...
mobile cybersecurity

Would You Trade Your Mobile Gmail for Extra Security?

0
The mobile devices we use for nearly every aspect of our lives are vulnerable to attackers.  In fact, 88% of organizations worldwide experienced targeted phishing...
cybersecurity

Cyber Intelligence Crucial for Cybersecurity Plan Validation

0
By Or Shalom, security and cyber expert and adviser The establishment of a work plan in the cyber field is not a simple task. Alongside...
smart home

Smart Home is Falling Apart, Would Google Supply Adequate Response?

0
The message heard at the CES 2018 technology exhibition said smart speakers have become available for everyone and are part of daily life. However,...
darpa

DARPA Seeks Innovation – In-House

0
The U.S. military researchers’ initiative to develop secure integrated circuit technology for trusted computing applications, ranging from manufacturing to systems integration goes on. Sources...

EU’s Right To Be Forgotten Flaws Revealed

0
Under EU law, citizens have the “Right to be Forgotten,” whereby they can petition internet search providers such as Google to remove search results...
image provided by pixabay

India Seaports Left Vulnerable

0
Newly launched platform for managing all port operations in India left public access to sensitive data, posing the risk of a potential takeover by...

Israeli Scientists Prove it’s Not Safe to Click on Your Keyboard

0
A trio of scientists have proved that they can extract a 4096-bit RSA key from a laptop using an acoustic side-channel attack that enables...
autonomous cars

Danger to Watch Out for in Autonomous Cars

0
Autonomous cars are still being developed, and this means that an ever growing quantity of data is a massed through cars' navigational technologies. Recently,...

SQream – Big Data on your video card

0
SQream Technologies has opened a unique columnar Database based on the computerized power of GPU. This is the only columnar database today which allows...
cyber attack

Additional Targets to Recent Cyber Attack on US National Assets

0
The consequences of the recent cyber attack against US national targets are likely to be far-reaching, with U.S. officials already reconsidering U.S. approaches to...

Latest

image provided by pixabay

“Responsible AI” – The Solution to the Deepfake Threat?

0
Several months ago, thousands of Democratic New Hampshire voters received a telephone call from none other than US President Joe Biden urging them not...