Cyber

Cyber

Cornell researchers have found that like humans, computers based on machine learning can be fooled by optical illusions, which raises security concerns. Cornell graduate student...

Vehicle systems store a vast amount of data such as recent destinations, favorite locations, call logs, contact lists, SMS messages, emails, pictures, videos, social...

Cyber Security has become a priority in various defense fields. Enhancing the cyber security of nuclear systems has certainly become an imperative. A U.S. Air...

A set of strategic principles was issued by the US Department of Homeland Security regarding Internet of Things (IoT) security. The guidelines promote transparency...

Germany's cabinet approved a new cyber security strategy due to a growing number of attacks, especially from China and Russia. The strategy calls for the...

Researching vehicular cybersecurity and its role in future law enforcement was the focus of the first part of a project carried out as a...

Biometrics and IoT (Internet of Things) technologies represent a symbiotic match that together will drive further IoT adoption, according to techzone360.com evaluation. The IoT market...

Rostec, the Russian state arms contractor, has launched its own anti-hacking center to deal with attempted cyberespionage attacks, the company’s IT subsidiary RostecInform (RT...

According to a report written by the Active Defense Task Force from the George Washington University's Center for Cyber and Homeland Security (CCHS), the...

Virtual criminal activity started as early as the 1970s. In 1984, the first computer forensics program, Magnetic Media, was created by the FBI to...

By Gad Elkin, Information Security Director in F5 In the film “Ransom”, Mel Gibson plays the role of a father who is trying to save...

Chinese hackers have recently launched a network attack for targeting people attending a US-Taiwan Defense Industry Conference. The conference was attended by defense officials,...

Following recent reports of cyber attacks by major international players like China and Russia, the UK has decided to take it’s cyber security abilities...

The Internet of Things (IoT) merges software and hardware with network connectivity, for the benefit of creating smart cities and safe cities. IoT devices -...

Israel has pledged to assist Nigeria in tackling cyber crime and internal insecurity through the use of modern technology. This was announced by Guy Feldman,...

The American Department of Homeland Security released a few days ago a public statement that it is closely monitoring events arising from the DDoS...

CounterTack, the cybersecurity company, recently announced that it’s endpoint detection and response (EDR) security technologies are now available worldwide as a new managed EDR...

Elbit Systems Ltd. announced that its subsidiary, CYBERBIT Ltd., was awarded a contract to supply its CYBERBIT Range platform to the Cyber Security Training...

Israel Aerospace Industries (IAI) signed a significant contract worth $15 million for a cyber-intelligence system with a customer in Asia. The contract is for...

The international standards body for the internet is now finalising specification to enable all smart devices to connect directly with websites via Bluetooth, but...
ihls security accelerator

Call For Proposals For Startups In Defense and HLS Fields   iHLS, the global media leader in security technology, is inviting entrepreneurships in this field to...

The coordinated cyber attack that crippled parts of the internet on October 21 highlighted key policy problems, a Stanford cybersecurity scholar said. Herbert Lin, a...