Cell phones in army use – a growing problem

0
The problem is shared by all the armies using cellular devices. While the Israeli defense forces (IDF) is looking for ways to better protect the...

Will Israeli budget cuts hurt the country’s ability to counter Cyber...

0
This time it seems that the Israeli Government’s budget axe will fall hard on the Israeli defense budget. The specifics are not yet known,...

China and the U.S. join forces on cyber security?

0
This is surprising and only time will tell if it`s real. China and the US, have agreed to set up a cyber security working group. "All...

INSS Global Cyber Review – April 2013

0
Israel Israeli Government invests in the next generation of cyber experts The Israeli government has decided to invest approximately 300m ILS to improve research and development...

Future Cyber attacks – this is the shape of things to...

0
The attack came via ordinary email, when selected South Korean companies received messages supposedly containing credit card information in the middle of the week...

Netting a Woman

0
Written by: Vickie Zisman I am sure Mel Brooks or Jay Roach (Austin Powers) would love to adapt the following for the screen:  Matta Harry,...

Kaspersky Labs: Active Cyber-espionage Campaign Targeting Online Gaming Companies Worldwide

0
Today Kaspersky Lab’s team of experts published a detailed research report that analyzes a sustained cyberespionage campaign conducted by the cybercriminal organization known as “Winnti.” According...

Cyber tools = weapons

0
Six cybertools have been designated as weapons by the U.S. Air Force, allowing the programs to better compete for increasingly scarce Pentagon funding, an...

The Cyber attack on Israel began days before April 7th, the...

0
The Cyber attack on Israeli sites began before April 7. This date was selected as a symbolic one on the eve of the holocaust...

The Third Scenario – Business Continuity Planning in the face of...

0
Our lives are interlaced in a gentle existence fabric that is usually balanced between everyday routine and special events.  Exceeding that precious balance due...

The combined war against Cyber attacks – first signs

0
  Experts say that the Cyber attacks on Israel will grow in number and severity. There are first signs of cooperation with other countries on...

Israel braces for major Cyber attack tomorrow

0
The Israeli National Cyber Defense Office has taken some " unprecedented steps" to protect national assets from the Cyber attack on Israel planned for...

April 7th cyber attack

0
Background As you all know, there is a planned cyber attack on Israeli websites, planned for April 7th 2013. Actually, the attack has already begun. In...

Are the Israeli emergency telephone lines a target of Cyber attacks?

0
Israeli emergency services are evaluating the security level of their telephone lines. This - as attacks on theses line are gaining popularity among Cyber...

The Chinese IT espionage – steps taken to minimize the danger

0
Israeli companies have been instructed to "be careful" when purchasing information technology systems made in China. That because of the Chinese state organized Cyber...

U.S. Department of Homeland Security Seduces Young IT Geniuses

0
In an article published in the New York Times, Secretary of the U.S. Department of Homeland Security, Ms. Janet Napolitano, said that she is...

Massive cyber-attack affecting the internet

0
Written by: Joey Peleg In the last few days, news outlets started receiving reports of serious slow Internet traffic that is causing widespread congestion and jamming...

Cyber-crime: A National Security Issue?

0
By Lior Tabansky INSS – Cyber Warfare Program Cyberspace, an offshoot of the development of computer and digital communications technologies, has in recent decades become part...

INSS Cyber Review – March 2013

0
  Israel - Planned cyber-attack against Israel uncovered An anonymous organization planning to commit cyber-attacks against Israel in April 2013 has recently been uncovered.  The attackers, codenamed...

The Nigerian Sting – “the founding fathers” of cyber crime

0
A cyber attack can cause a complete collapse of homeland security systems in many countries, and paralyze the functioning of basic and critical infrastructure....

Computer users warned against a new “ransomware” virus

0
The "Nigerian Sting" scam is not alone on the web. The U.S. government warned computer users to beware of fake emails they may receive...

The “Big Brother” in the U.S. Will he be born...

0
"Big brother"  is already seeing almost everything. Now at least in the U.S. , he is going to look into our very intimate e-mails....

Latest

image provided by pixabay

Improving Automatic Software Repair

0
FIXCHECK is a new approach to improve patch fix analysis that combines static analysis, randomized testing, and large language models, created by IMDEA Software...