Cyber

Cyber

Internet of Things, a business growing at a compound annual rate of 7,9% that is a privileged target for hackers and cyber criminals. The Internet...

"Crimes used to happen through stickups, but today criminals use mouse clicks," said Greg Garcia, a U.S. spokesperson for financial industries. This statement comes...

A New trend: Small, mercenary hacker groups conduct precise “hit and run” operations. A new report by Kaspersky Lab discusses Icefog, a small but active...

U.S.A Hacking U.S Secrets, China Pushes for Drones plan The NY Times published on September 20, 2013 that for approximately two years, hackers based in Shanghai...

Almost half of the companies who took part in an IDC global information security market survey (Worldwide Security Products Survey) believe that highly advanced...

John McAfee revealed his new tech company, Future Tense Central, at the C2SV Conference last Saturday. According to ABC News the company's first product,...

U.S Air Force officials are working to develop an “effective” procurement model for buying equipment and services related to activities in the cyber domain,...

U.S. officials revealed that Iran hacked unclassified Navy computers in recent weeks in an escalation of cyber attacks against U.S. infrastructures. The Wall Street Journal...

The top security official for Jewish organizations was named to a consulting body to the Department of Homeland Security. Paul Goldenberg, the director of the...

Just 10 minutes could be sufficient for an attacker to hack the Nasdaq Stock Market, this was the alert sounded by Ilia Kolochenko, head...

Africa is becoming an “online continent” despite its economic difficulties, at the same time there is a growing incidence of cybercrime. According to Security Affairs...

Israel Israel: Anonymous planned new cyber-attacks on Israel web sites AnonGhost, an affiliate group of the Anonymous hacker organization, was threatening Israel by planning new cyber-attacks...

A U.S. led military attack on Syria may have been averted, at least for a while, by the Russian proposal to negotiate the transfer...

By Yotam Rosner, Aviad Mendelbaum, Sean London, and Yoram Schweitzer On Friday, August 2, 2013, the US State Department published a travel warning, and in...

The NSA used ‘man in the middle’ hack attacks to impersonate Google and fool web users, leaks have revealed. The technique circumvents encryption by...

Lockheed Martin has been selected to design the Active Network Infrastructure (ANWI) for NATO’s new headquarters in Brussels, Belgium. This contract, worth more than...

Germany’s Der Spiegel newspaper –joining the NSA revelations train – reported that the intelligence agency is interested in international credit card transactions and may...

Almost half of all the organizations taking part in the survey have no policy at all, and only 14% fully implement information security policies...

The first two minutes of a cyberattack are crucial - that's when the attacker sets up camp and downloads additional malware to dig in...

Are hostile cyber criminals from North Korea targeting their friendly neighbor to the south? According to a recent report by the Kaspersky Lab information security...

Palo Alto Networks, represented in Israel by Aman Group's Innocom, recently announced that their sandbox environment Wildfire, allowing malware analysis and protection against zero-day...

The fingerprint sensor built into Apple's latest smartphone, which was unveiled on Tuesday, could signify the beginning of the end for the pesky password....