Cyber

Cyber

Cyber security initiatives are sufficiently challenging to the defense strategists of nations. When it comes to mounting and conducting cyber defense programs within coalitions,...

Elbit Systems developed an advanced trainer for various levels of Cyber warriors, as part of its large scale entry into the Cyber field. Elbit system...

 Kaspersky Lab is following an elusive cyber-espionage campaign targeting diplomatic, governmental and scientific research organizations in several countries for at least five years. The...

Can hackers damage the Israeli spy and communications satellites? This question is now evaluated by experts after such attacks were performed on American satellites. In recent...

By Yair Mohr This time the "Defenses" held. But all the experts expect more attacks and with more force. The experts are getting ready for the...

Internet users are seeing less spam but more targeted attacks, according to security software company Symantec. Looking at last year's security landscape, Symantec's Internet Security...

The problem is shared by all the armies using cellular devices. While the Israeli defense forces (IDF) is looking for ways to better protect the...

This time it seems that the Israeli Government’s budget axe will fall hard on the Israeli defense budget. The specifics are not yet known,...

This is surprising and only time will tell if it`s real. China and the US, have agreed to set up a cyber security working group. "All...

Israel Israeli Government invests in the next generation of cyber experts The Israeli government has decided to invest approximately 300m ILS to improve research and development...

The attack came via ordinary email, when selected South Korean companies received messages supposedly containing credit card information in the middle of the week...

Written by: Vickie Zisman I am sure Mel Brooks or Jay Roach (Austin Powers) would love to adapt the following for the screen:  Matta Harry,...

Today Kaspersky Lab’s team of experts published a detailed research report that analyzes a sustained cyberespionage campaign conducted by the cybercriminal organization known as “Winnti.” According...

Six cybertools have been designated as weapons by the U.S. Air Force, allowing the programs to better compete for increasingly scarce Pentagon funding, an...

The Cyber attack on Israeli sites began before April 7. This date was selected as a symbolic one on the eve of the holocaust...

Our lives are interlaced in a gentle existence fabric that is usually balanced between everyday routine and special events.  Exceeding that precious balance due...

  Experts say that the Cyber attacks on Israel will grow in number and severity. There are first signs of cooperation with other countries on...

The Israeli National Cyber Defense Office has taken some " unprecedented steps" to protect national assets from the Cyber attack on Israel planned for...

Background As you all know, there is a planned cyber attack on Israeli websites, planned for April 7th 2013. Actually, the attack has already begun. In...

Israeli emergency services are evaluating the security level of their telephone lines. This - as attacks on theses line are gaining popularity among Cyber...

Israeli companies have been instructed to "be careful" when purchasing information technology systems made in China. That because of the Chinese state organized Cyber...

In an article published in the New York Times, Secretary of the U.S. Department of Homeland Security, Ms. Janet Napolitano, said that she is...