A successful targeted attack against a large organization can cause 2.4 million dollars in damages, that's according to an international organizational threats survey by...
In an effort to encourage critical infrastructure companies to adopt the measures which will be recommended by the forthcoming, national institute of standards NIST-developed...
It may be considered a paradox but this is the reality. While countries develop very deadly and unconventional weapons, some of these countries also...
Elbit Systems, announced today that its Australian subsidiary, Elbit Systems of Australia Pty Ltd (ELSA), was awarded a contract in the amount of approximately...
The U.S. government is planning to expand its suspect surveillance programs to include tactics which are commonly used by computer hackers.
Fox News reports that...
The current concern for both privacy advocates and counterintelligence is that smart homes and smart appliances can be used to gather information about their environment and...
ibm reveals a new integrated security system, helping organizations detect vulnerabilities and threats in real time while reducing security costs. Significant parts of the...
ThetaRay, an Israeli innovator in preventing Advanced Persistent Threats (APT) and Zero Day Attacks, announced today that GE is joining Jerusalem Venture Partners (JVP)...
The New Zealand Defense Force wants to spend $469 million creating itself a new cyber army. The kiwis have cut back on their defense force dramatically...
Computers manufactured by the world’s biggest personal computer maker, Lenovo, have been banned from the “secret” and ‘‘top secret” networks of the intelligence and...
The protection of national strategic assets (which nowadays can be compromised by a cyber-attack almost instantly) is, and must always be, the priority ,whether...
USA
U.S: Cooperation with India on cyber security issues
The United States started to build a strong partnership with India on cyber security issues....
Subscriber Identity Module cards, also known as SIM cards, the basic tools used to identify mobile subscribers, are increasingly turning into our most personal...
According to a survey carried out by Kaspersky Labs and B2B international, 82% of organizations defend against malicious code, and 80% use anti-spam technologies....
Ministry of Communication and Information Technology, Department of Electronics and Information Technology
New Delhi, July 2nd 2013
Vision
To build a secure and resilient cyberspace for citizens,...
The vulnerability of legacy networked computer systems was discussed in an earlier article. In addition to that, hackers can utilize social engineering to take...
Often seen as inflexible, slow and failing to deliver on the promise of Security Information and Event Management (SIEM), the traditional SIEMs of yesterday...
The United Nations is warning telecommunications regulators and government agencies about significant vulnerabilities in cell phone technology which would allow hackers to attack at least half...