Cyber

Cyber

A significant security breach has been discovered in the DNS protocol, by Israeli students from the Technion's Department of Computer Sciences. As a result...

U.S. officials and security experts are warning that Russian hackers may attack the computer networks of U.S. banks and critical infrastructure firms in retaliation...

Artificial intelligence students at the Israeli Technion predict voting patterns for Knesset members. New algorithms can predict the way Knesset members will vote on various...

The U.S. Army distributed a new field manual for soldiers: How to use the electromagnetic spectrum to your advantage. Recently, alongside global military interest in...

Interview with Chen Genossar, VP of Business Development at Afcon Control & Automation, on SCADA - Supervisory Control And Data Acquisition - and cyber...

Online criminals discover the bitcoin: More than 8 million anti-bitcoin attacks recorded in 2013 * watch your online wallet carefully. The virtual currency bitcoin suffers...

Articles and issues covered in this episode: Australian authorities warn commercial drone operators New technology allows remote wiping of mobile devices Giant lobster robot saves lives and conducts...

A recently published cybersecurity report warns against the rising Iranian cyber threat, in light of the general rise in the scale and scope of...

Recently we have been constantly reminded of how vulnerable are our mobile phones – the infamous NSA spy program, for example, or the smartphones...

2013 Cybersecurity report: A rise in the number of threats aimed at accessing sensitive information and bank acounts * Phishing attacks. A third of the...

A new report reveals that the cyber-espionage phenomenon is on the rise, with government agencies as the main targets. According to a recent Verizon cyber-security...

Intelligence agencies are hiding critical information from the public, and private organizations aren't aware of the true severity of global cyber threats. That's according...

April 15th, 2014 ISRAEL Israel well prepared against cyber-attacks #OpIsraelBirthday occurred with no real damage, save for a few minor sites whose webpages were defaced, old credit...

Articles and issues discussed in this episode: Russians hack U.S. drone over Crimea New study: U.S. borders with Mexico damage local wildlife New underwater sonar for drilling...

What does big data have to do with politics? In the United States, for example, party consultants use advanced data analysis to help plan...

Articles and issues discussed in this episode: Israeli hackers retaliate, attack pro-Palestinian hackers Microsoft searched Hotmail accounts illegaly Ransomware attack caused Romanian citizen to commit suicide Facebook fraud...

The future combination of cyber warfare and electronic warfare (EW): Lesson learned from an incident involving a U.S. drone brought down by the Russians...

A recent report of a U.S. surveillance drone flying over the Crimea region of Ukraine being hacked by Russian forces, is just one of...

Issues and articles discussed in this episode: HeartBleed - Major, global cyber-security breach discovered Britain's new Porton Man robot tests protective gear mean for soldiers Global Hawk...

By Uri Shapira The story of the four sons: Hackers get more and more advanced, exploiting employees through a variety of sophisticated methods. Many hackers...

The NSA knew about and exploited the Heartbleed vulnerability for two years before it was publicly exposed this week, and used it to steal...

The U.S. intelligence agencies' activities are already infamous, although their depth and scope are not yet clear. According to a Microsoft researcher new encryption...