Cyber

Cyber

cyber

Germany's military, the Bundeswehr, presents a high-value target for hackers and foreign spy agencies – not only because of its military secrets, but also...
security breaches

Mobile phone apps have increasingly become vulnerable to security breaches. Virginia Tech researchers have recently discovered that the same apps we regularly use on...
cyber

Domestic cyber networks in the US need more security to uphold the defense of the nation, says the United States Transportation Command’s (TRANSCOM) leader....

iHLS, the global media leader in security technology, is inviting entrepreneurship in this field, with emphasis on dual-use technology, to join the third cycle of...
startup festival

  Many people are present this morning at the Startup Festival and Startup Live Competition organized by iHLS for the second year. The first 10 startups...
threat modeling

Augmented reality and virtual reality have the potential to serve as threat modeling tools that could enhance security professionals’ understanding of the threat landscape...
national cyber center

  The Israeli Cyber Companies Consortium (IC3) was recently awarded a contract worth tens of millions of dollars to establish a national cyber center in...
ihls security accelerator

iHLS, the global media leader in security technology, is inviting entrepreneurship in this field to join the third cycle of the world first accelerator at...
iot security

Internet of Things - IoT security breaches have been dominating headlines lately. Even if you personally don’t suffer consequences of the mediocre security of...
cyber

By Arie Egozi While Israel is getting ready to a possible attack from Gaza or Lebanon, the silent war is around the corner and in...
border protection systems

Israel Aerospace Industries' (IAI) was recently awarded a contract to supply border protection systems in a South American country. According to the contract worth...
security camera

  Security vulnerabilities were found at a popular security product. A security researcher has recently published a vulnerability and proof-of-concept exploits in Google's Internet of...
insider threat

  Insider threats constitute a serious challenge to system administrators and IT security teams, as they exist in every company and organization, from small businesses...
cyber crime

Lockheed Martin will support the US Department of Defense's efforts against cyber criminals under a new contract. The company will continue its role as...
GPS control system

U.S. Air Force Global Positioning System Next-Generation Operational Control System, known as GPS OCX, has been progressing. Developed by Raytheon under contract to the...
robots communication

A new technology could protect robots communication networks from malicious hackers. Researchers from MIT’s Computer Science and Artificial Intelligence Laboratory and their colleagues present...
cyberthreats

The annual assessment of the biggest cyberthreats to U.K. businesses has been published recently, after being produced jointly for the first time by the...
surveillance

The new privacy policy announced by Facebook and Instagram bans developers from using their data for surveillance. Following revelations last year that police departments...
cyber

In the near future, the cyber industry will have to cope with a wider array of cyber threats and challenges resulting from the vulnerabilities...
Cybersecurity

Following the recent New York Times report about what may be the largest leak of C.I.A documents in history on WikiLeaks, Michael Hill, a...
cybersecurity

A new cooperation agreement in the cybersecurity for organizations field offers an efficient response to the growing information security challenges. The cybersecurity company Experis Cyber...
cyber security

The US intelligence branch has been reinforcing its cyber security array. General Dynamics Information Technology, a business unit of General Dynamics, was awarded a...

Latest