Germany's military, the Bundeswehr, presents a high-value target for hackers and foreign spy agencies – not only because of its military secrets, but also...
Mobile phone apps have increasingly become vulnerable to security breaches. Virginia Tech researchers have recently discovered that the same apps we regularly use on...
Domestic cyber networks in the US need more security to uphold the defense of the nation, says the United States Transportation Command’s (TRANSCOM) leader....
iHLS, the global media leader in security technology, is inviting entrepreneurship in this field, with emphasis on dual-use technology, to join the third cycle of...
Many people are present this morning at the Startup Festival and Startup Live Competition organized by iHLS for the second year.
The first 10 startups...
Augmented reality and virtual reality have the potential to serve as threat modeling tools that could enhance security professionals’ understanding of the threat landscape...
The Israeli Cyber Companies Consortium (IC3) was recently awarded a contract worth tens of millions of dollars to establish a national cyber center in...
iHLS, the global media leader in security technology, is inviting entrepreneurship in this field to join the third cycle of the world first accelerator at...
Internet of Things - IoT security breaches have been dominating headlines lately. Even if you personally don’t suffer consequences of the mediocre security of...
Israel Aerospace Industries' (IAI) was recently awarded a contract to supply border protection systems in a South American country.
According to the contract worth...
Security vulnerabilities were found at a popular security product. A security researcher has recently published a vulnerability and proof-of-concept exploits in Google's Internet of...
Insider threats constitute a serious challenge to system administrators and IT security teams, as they exist in every company and organization, from small businesses...
Lockheed Martin will support the US Department of Defense's efforts against cyber criminals under a new contract. The company will continue its role as...
U.S. Air Force Global Positioning System Next-Generation Operational Control System, known as GPS OCX, has been progressing. Developed by Raytheon under contract to the...
A new technology could protect robots communication networks from malicious hackers. Researchers from MIT’s Computer Science and Artificial Intelligence Laboratory and their colleagues present...
The annual assessment of the biggest cyberthreats to U.K. businesses has been published recently, after being produced jointly for the first time by the...
The new privacy policy announced by Facebook and Instagram bans developers from using their data for surveillance. Following revelations last year that police departments...
A new cooperation agreement in the cybersecurity for organizations field offers an efficient response to the growing information security challenges.
The cybersecurity company Experis Cyber...
The US intelligence branch has been reinforcing its cyber security array. General Dynamics Information Technology, a business unit of General Dynamics, was awarded a...