Cyber

Cyber

By Avi Yariv Command and Control systems are the brain and heart of most of the modern complex systems worldwide. The ability to Monitor (watch),...

June 1, 2014 ISRAEL Physical cyber infrastructure failure While the Israeli government heavily invests in cyber security, the physical side of Israel cyber systems have been neglected....

Be careful when you conduct online transactions: Cybercriminals may send you fake bank messages to get to your money! 30% of the private users who...

Issues and articles discussed in this episode: New, advanced command center in Rio de Janeiro Iranian hackers infiltrate America DARPA develops mobile wireless hotspot tech for drones Britain...

The Iranian hackers may have spent years in running a creative and most dedicated cyber espionage campaign to steal government credentials with the help...

Belgian Prime Minister Di Rupo allocated 10 billion euro for improving and upgrading cyber security in Belgium, an amount the government was obligated to...

The use of Software-Defined Networking in Next Generation Tactical Networks Tomer Nuri “The secret of war lies in the communications”, although I'm quite sure that when...

Within the next five to seven years, as much as $21 trillion in global economic-value creation depends on robust cyber security.This estimate is part...

More than a half million computers in more than 100 countries were infected by sophisticated malware that lets cybercriminals take over a computer and...

West-African states are cracking down on cyber-crime. The ECOWAS organization, the Economic Community of West African States, has announced the establishment of Computer Emergency...

The Federal Bureau of Investigation will aggressively crack down on cyber crime over the next few weeks, with a bureau official advising the public...

Inside the national cyber command room of Israel's Electric Corporation: 4,680 cyber events every second * 600 million blocks of information each day *...

Iranian hackers have become increasingly aggressive and sophisticated, moving from disrupting and defacing US websites to engaging in cyber espionage, security experts say. According to...

In a new legal resources page posted on its website, Apple outlined its guidelines regarding requests for customer data from from U.S. law enforcement...

We're entering a new age, an age where our devices are connected to the internet, communicating through the net to fulfill various needs. When...

The FBI has issued a private industry notification (PIN), warning healthcare providers that their cybersecurity networks are not sufficiently secure compared to the networks...

The potential threats from Russia and China leave less time for British security bodies to pry in citizen private lives. In recent months, GCHQ –...

Due to expanding cyber-attack vectors on the energy grid and the significant growth in popularity of electric vehicles (EV’s), Nation-E, a provider of energy...

May 1st, 2014 ISRAEL Developments in IDF cyber campaign for officials The Israeli Defense Force (IDF) exposed its in-house newsfeed, which is published through Ynet. The site...

Articles and issues discussed in this episode: Israeli researchers develop a virtual periscope that can operate underwater U.S. develops system that allows drones to cooperate in...

The Army’s academy has established a cyber warfare research institute to groom elite cyber troops and solve thorny problems for the Army and the...

A cyber attack on the Australian parliamentary computer network in 2011 may have given Chinese intelligence agencies access to lawmakers’ private emails for an...