Iran is investing huge sums of money in developing aggressive cyber war techniques
Both government and private cybersecurity experts are increasingly considering Iran as a...
California's Attorney General says cyber criminals are increasingly focusing on California because of its wealth and innovation.
The report by California Attorney General Kamala Harris...
Articles and issues discussed in this episode:
U.S. DHS cancels national license plate database
Israel hacks Iranian nuclear centrifuge system
CIA may have acted against U.S. senators...
Academic institutions are easy targets since many do not invest in sophisticated IT personnel or employ the latest cybersecurity programs. Some students have noticed...
The proliferation of cyberthreats to communication networks has presented satellite operators with new challenges in protecting customer data against threats.
According to Aviation Week security...
Software development processes, perhaps surprisingly, conceal many cyber-security pitfalls. New courses for programmers aim to solve these problems
Information security is a constantly expanding market....
The chaos in cyberspace continues, in light of the tense situation between Ukraine and Russia. During the weekend hackers opposing Russian President Vladimir Putin...
Israeli experts are studying the results of an exercise that pointed to the vulnerability of the electrical grid
The North American Electric Reliability corporation (NERC)...
March 15th, 2014
Israel
Two weeks of diverse cyber-attacks in Israeli cyberspace
Since the start of the month, Israeli companies are experiencing numerous cyber-attacks. One of the...
Articles and issues discussed in this episode:
Ransomware virus infects Israeli computer systems
Global security applications market to top 300 million by 2016
Unmanned ground vehicle...
The way we secure digital transactions could soon change. An international team has demonstrated a form of quantum cryptography that can protect people doing...
New Windows Phone safe-surfing application blocks hackers attempting to redirect traffic to fake websites or e-mail accounts
How can we protect our smartphones against fraud...
This report covers two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever...
A new platform for operating systems would outwit cyber criminals
As Smartphone use surges, consumers are just beginning to realize their devices are not quite...
Israeli cyber investor JVP announced that an innovative startup company from Ben-Gurion University of the Negev won the first ever Cybertition. The winner of...
The Homeland Security Department awarded a pair of multi-million dollar contracts aimed at security, one in biometric identification and one in network security.
After months...