User Information for Sale on The Dark Web
A recent report has shown that many social media databases are currently being sold on Breach Forums, a popular hacking forum on the Dark...
Russian Hacking Remains an Issue
Russian hacking attacks leave the victim with a mere 19 minutes to respond to an attack, according to data published by computer security company...
Two Steps to Protect Your Passwords
Conventional password security measures have become insufficient when massive data breaches frequently expose millions of users to hacking attacks. More than 92M customer records...
ISIS Makes Use of Bitcoin Anonymity
The concept that bitcoin could be used to help fund terrorists has been a long-standing concern among law enforcement and government agencies worldwide. Indeed,...
Department Of Defence To Invest In Biometrics
Things like lightning fast DNA processing, biometrics recognition based on iris scans, thumbprint or voice patterns and video face recognition from vast distances seemed...
Cyber Solution to Accelerate Time from Threat Detection to Response
As the frequency and sophistication of cyber-attacks continuously increase, governments and critical infrastructure providers face significant challenges. A cyber security solution designed for customers...
Russian Cyber Strategy – The New Battle Zone
The Russian government has long been known to use criminal hackers for its’ world-class hacking abilities and intelligence gathering. The criminal group most likely...
Cyber – One of IAI’s Strategic Fields Gains Momentum
IAI’s cyber activity continues to grow. The company’s 2016 contracts concluded in this field totalled more than $100 million, all of them in the...
Smart Watches Hacking Showcased by Chinese Hackers
Until not long ago China was reluctant to open to the developments in the Internet shpere. However, in recent years this country has been...
Solutions to Cyber Hacking Risks at the Automotive Sector
Hacking has become one of the auto industry's biggest concerns, especially as modern cars add more electronic controls and infotainment systems. Last March, the...
Your Mouse Could Help Track You Online
The privacy focused Tor network has been a regular feature of the news in recent years, most recently with the confirmation by a US...
Carnegie Mellon Tor Attack Confirmed
Despite repeated denials by the US government, a federal judge has now confirmed that Carnegie Mellon University (CMU) was commissioned by the government to...
Google Official: ISIS Should Be Kicked Off The Internet
Jared Cohen, director at Google Ideas and an advisor to the heads of parent company Alphabet Google, said ISIS should be kicked off the...
5,500 ISIS Accounts Taken Down By Anonymous
Following Anonymous’ declaration of “total war” on ISIS, the hacktivist collective reports taking down more than 5,500 Twitter accounts belonging to ISIS members. Details...
Is Now A Cyber Watershed For ISIS?
The cyberattack on TalkTalk, a telecommunications company in Britain, could be a watershed moment in Islamic State's (Isis) cyberwar against the West, cybersecurity experts...
UK Communications Company Hacked By “Russian Jihadis”
TalkTalk, the British telecoms company, has admitted that it has suffered its third major cyberattack in the last 12 months with data from its...
The Enemy Within: Most Cybercrimes By Employees
In an era where most organizations run on electronic communications, it is not only executives and IT engineers who hold the keys to the...
Increase In Use Of Dark Web For Data Unlock Ransom Demands
IBM’s security division has published its security threats reports for the third quarter of 2015 which it pointing out to an increasing danger of...
INTERPOL Leading The Fight Against The Darknet
Identifying the methods and strategies used by organized crime networks and individuals to avoid detection on the Darknet was the focus of a specialized...