Cyber

Cyber

Quantum entanglement is one of the weird properties of quantum mechanics. Two particles, once joined, behave in a mirror-opposite way even when separated by...

In a not surprising turn of events, China is employing ever more sophisticated technologies in its surveillance apparatus to allow authorities to profile and...

In a surprising plot twist in the ongoing legal saga of the San Bernardino shooter’s iPhone case, the local District Attorney Michael Ramos is...

The US Department of Homeland Security (DHS) has set up an outpost deep in Silicon Valley to have better access to exciting startups and...

The Internet of Things, a vast network of sensor nodes and devices, is promising to revolutionise our lives. In many ways, it’s already here,...

ISIS hackers have posted the personal details of U.S. officials online, encouraging the group’s supporters to carry out “lone wolf” attacks against them. Newsweek reports...

Personal information theft is one of the greatest risk factors for users online. Malicious websites that install malware designed to steal banking credentials, phishing...

A new French law would impose penalties and fines on smartphone manufacturers who refuse to hand over encrypted information to law enforcement in terrorism...

By ARIE EGOZI The recent Ransom Cyber attacks on some of Israel's organizations have again focused the attention to the imminent threat.  Is Israel ready? Well,...

While organizations spend tens of billions of dollars every year to protect themselves from cyber attacks, the disturbing truth is that in most cases,...

In the complex realm of modern information security, communications networks are becoming increasingly larger and much more complex than in the past, creating a...

The mobile-first organization is forced to operate in a new IT environment: compromised mobile devices, BYOD programs, and evolving cybercrime. Enterprises are struggling to...

Most current password security systems for the Internet are flawed. And it goes beyond the systems themselves: Passwords really are just an awful way...

The infamous John McAfee has lambasted the US government as being so technologically “illiterate” and so incompetent at protecting the country’s digital assets that...

In the field of cyber security, everyone has one main goal: staying ahead of the game. The hackers are constantly seeking out new avenues...

Defence manufacturer Northrop Grumman is tackling one of the biggest developing problems of fighter jets: cyber risk. Tom Vice, President at Northrop Grumman Aerospace...

SQream Technologies has opened a unique columnar Database based on the computerized power of GPU. This is the only columnar database today which allows...

US can’t be successful in banning encryption as it is a global phenomenon, according to Harvard study. Despite over two years’ efforts by the...

While each person might define it in different terms, Big Data is basically this: A collection of data from traditional and digital sources for...

Electronic warfare, espionage, and hacking are now a reality of everyday life. While most of us go about without giving a second thought to...

Stuxnet, the world-famous computer worm that destroyed Iran’s centrifuges at the Natanz uranium enrichment plant, was only one part of a much larger operation....

With the months long power outage in Crimea, the world saw how easy it is to leave an entire region with no electricity. Attacks...