Cyber

Cyber

Iran is investing huge sums of money in developing aggressive cyber war techniques Both government and private cybersecurity experts are increasingly considering Iran as a...

California's Attorney General says cyber criminals are increasingly focusing on California because of its wealth and innovation. The report by California Attorney General Kamala Harris...

Articles and issues discussed in this episode: U.S. DHS cancels national license plate database Israel hacks Iranian nuclear centrifuge system CIA may have acted against U.S. senators...

Academic institutions are easy targets since many do not invest in sophisticated IT personnel or employ the latest cybersecurity programs. Some students have noticed...

The proliferation of cyberthreats to communication networks has presented satellite operators with new challenges in protecting customer data against threats. According to Aviation Week security...

Software development processes, perhaps surprisingly, conceal many cyber-security pitfalls. New courses for programmers aim to solve these problems Information security is a constantly expanding market....

The chaos in cyberspace continues, in light of the tense situation between Ukraine and Russia. During the weekend hackers opposing Russian President Vladimir Putin...

Israeli experts are studying the results of an exercise that pointed to the vulnerability of the electrical grid The North American Electric Reliability corporation (NERC)...

March 15th, 2014 Israel Two weeks of diverse cyber-attacks in Israeli cyberspace Since the start of the month, Israeli companies are experiencing numerous cyber-attacks. One of the...

Articles and issues discussed in this episode: Ransomware virus infects Israeli computer systems Global security applications market to top 300 million by 2016 Unmanned ground vehicle...

The mysterious vanishing of the Malaysian flight raised a startling amount of rumors and theories of all kinds. While most are at least somewhat...

The way we secure digital transactions could soon change. An international team has demonstrated a form of quantum cryptography that can protect people doing...

New Windows Phone safe-surfing application blocks hackers attempting to redirect traffic to fake websites or e-mail accounts How can we protect our smartphones against fraud...

The U.S has proved again and again that it can utilize cyber weaponry to an effective degree. The employment of the Stuxnet virus by...

This report covers two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever...

A new platform for operating systems would outwit cyber criminals As Smartphone use surges, consumers are just beginning to realize their devices are not quite...

The U.S Air Force and Homeland Security Department have teamed up to create a new test kit that imitates cyber malware, the better to...

In 2013 145,000 malware attacks on mobile phones were recorded, three times the number in 2012. 98% of the malicious code attacks on mobile...

Israeli cyber investor JVP announced that an innovative startup company from Ben-Gurion University of the Negev won the first ever Cybertition. The winner of...

By Shai Rud A few days after the Curiosity rover landed on Mars, members of the hacker group Anonymous annoucned that they intend to hack...

According to various cyber security experts Israel is about to face two organized, large scale cyber attacks in the following weeks, on March 10...

The Homeland Security Department awarded a pair of multi-million dollar contracts aimed at security, one in biometric identification and one in network security. After months...

Latest