Cyber

Cyber

According to a report written by the Active Defense Task Force from the George Washington University's Center for Cyber and Homeland Security (CCHS), the...

Virtual criminal activity started as early as the 1970s. In 1984, the first computer forensics program, Magnetic Media, was created by the FBI to...

By Gad Elkin, Information Security Director in F5 In the film “Ransom”, Mel Gibson plays the role of a father who is trying to save...

Chinese hackers have recently launched a network attack for targeting people attending a US-Taiwan Defense Industry Conference. The conference was attended by defense officials,...

Following recent reports of cyber attacks by major international players like China and Russia, the UK has decided to take it’s cyber security abilities...

The Internet of Things (IoT) merges software and hardware with network connectivity, for the benefit of creating smart cities and safe cities. IoT devices -...

Israel has pledged to assist Nigeria in tackling cyber crime and internal insecurity through the use of modern technology. This was announced by Guy Feldman,...

The American Department of Homeland Security released a few days ago a public statement that it is closely monitoring events arising from the DDoS...

CounterTack, the cybersecurity company, recently announced that it’s endpoint detection and response (EDR) security technologies are now available worldwide as a new managed EDR...

Elbit Systems Ltd. announced that its subsidiary, CYBERBIT Ltd., was awarded a contract to supply its CYBERBIT Range platform to the Cyber Security Training...

Israel Aerospace Industries (IAI) signed a significant contract worth $15 million for a cyber-intelligence system with a customer in Asia. The contract is for...

The international standards body for the internet is now finalising specification to enable all smart devices to connect directly with websites via Bluetooth, but...
ihls security accelerator

Call For Proposals For Startups In Defense and HLS Fields   iHLS, the global media leader in security technology, is inviting entrepreneurships in this field to...

The coordinated cyber attack that crippled parts of the internet on October 21 highlighted key policy problems, a Stanford cybersecurity scholar said. Herbert Lin, a...

According to recent reports, the Australian government networks are at risk of cyber-attacks. previous incidents include foreign spies had hacking into the Bureau of...

A major cyber-attack that used hacked smart devices such as web cameras managed to shut down high-profile websites including Twitter, Spotify and PayPal, as...

The University of Connecticut’s (UConn) School of Engineering and Synchrony Financial, a consumer financial services company headquartered in the state, have announced earlier this...

Secretary of the National Security and Defense Council of Ukraine, Oleksandr Turchynov discussed at a meeting with the Romanian Minister of National Defense, Mihnea...

Cloud service providers of US Federal agencies and government organizations must meets strict standards and requirements in order to achieve a trusted provider status. CloudPassage...

A cyber defense software program is one of only eight technologies funded this year by the Department of Homeland Security (DHS). The program distinguishes...

An IT expert points out at various cyber security threats in the shipping field. Frank Coles, the CEO of Transas, a developer and supplier...

A global information technology company, Unisys Corporation, was awarded a contract by U.S. Customs and Border Protection (CBP), part of the Department of Homeland...