Cyber

Cyber

 The FCI (Financial Cyber Intelligence) Unit published a focused warning on Cyber attack of the distributed denial of service (DDoS) type, targeting several financial...

“Comprehensive endpoint protection is the foundation of a company’s security”, that was the title for Kaspersky Labs’ announcement of its new enterprise product, Endpoint...

Dr. Gabi Siboni from the Institute for Strategic Research spoke today about cyber threats, at the WindRiver conference , in cooperation with i-HLS, dividing...

This threat is mentioned seldom but it does not make it less lethal.  A cyber attack on Israeli infrastructure may include air traffic control installations....

First the enemy was in the shape of some hackers that wanted to prove a point. Then came governmental forces like the one from...

The FBI Internet Crime Complaint Center (IC3) has released the 2012 Internet Crime Report — a summary of reported fraudulent activity, including data and...

Assessment: the overwhelming majority of attacks will be using free shareware botnets. Muslim hackers organizations are preparing for another concentrated attack against government sites in...

Global Cyber Review   USA U.S. directly accuses China of cyber-attacks  The Obama administration explicitly accused China’s military of mounting attacks on American government computer systems and defense contractors, saying...

Since the dawn of the Internet, security has been a big issue. Having machines communicate and transmit information over a public, worldwide network makes...

A new wave of cyber attacks is striking American corporations. Officials say the attackers aim is not espionage but sabotage, and the source seems...

Northrop Grumman Corporation has signed a memorandum of agreement with the Department of Homeland Security (DHS) that will enable the expansion of cybersecurity protections...

The Obama administration accused China’s military of a campaign of cyberattacks on American government computer systems and defense contractors for the purpose of identifying...

A “group of mostly Middle East- and North Africa-based criminal hackers are preparing to launch a cyber attack campaign" beginning this week  “against websites...

    i-HLS ISRAEL Homeland Security    Israel Israel’s cyber capabilities among the best in the world     According to a McAfee cyber capability report, Israel shared first place with two...

Cyber security initiatives are sufficiently challenging to the defense strategists of nations. When it comes to mounting and conducting cyber defense programs within coalitions,...

Elbit Systems developed an advanced trainer for various levels of Cyber warriors, as part of its large scale entry into the Cyber field. Elbit system...

 Kaspersky Lab is following an elusive cyber-espionage campaign targeting diplomatic, governmental and scientific research organizations in several countries for at least five years. The...

Can hackers damage the Israeli spy and communications satellites? This question is now evaluated by experts after such attacks were performed on American satellites. In recent...

By Yair Mohr This time the "Defenses" held. But all the experts expect more attacks and with more force. The experts are getting ready for the...

Internet users are seeing less spam but more targeted attacks, according to security software company Symantec. Looking at last year's security landscape, Symantec's Internet Security...

The problem is shared by all the armies using cellular devices. While the Israeli defense forces (IDF) is looking for ways to better protect the...

This time it seems that the Israeli Government’s budget axe will fall hard on the Israeli defense budget. The specifics are not yet known,...