Cyber

Cyber

Power plants are some of the most critical bits on infrastructure. An attack against a power plant could incapacitate an entire region of any...

The Pentagon is set to step up its cyber warfare efforts against ISIS, and is arguing that disabling the group’s computers, mobile phones, and...

Elbit Systems' wholly-owned subsidiary, CYBERBIT, was awarded a contract to provide the Switzerland-based company, RUAG Defence, with CYBERBIT’s CyberShield - Cyber Security Trainer and...

The field of cyber warfare has brought about a paradigm shift in the old balance of power. Sheer force of numbers and financial and...

While Western powers are deeply engaged in debating the merits and dangers of encryption, Kazakhstan is leading the charge in bypassing the security mechanism...

Nearly half of enterprises are set to deploy Internet of Things (IoT) by the end of 2016, according to findings from 451 Research, an...

Avi Yariv At the Cyber and Regulation conference, which took place in the University of Haifa last week, special attention was given to the regulatory...

By ARIE EGOZI A big effort is being made to protect the Israeli aviation infrastructure from Cyber attacks. The threat is real and imminent. A cyber...

ISIS is known for its advanced application of propaganda techniques, far more so than their predecessors. Ghost Security Group, an online hacktivist collective whose...

Daniel Ehrenreich Supervisory Control and Data Acquisition (SCADA) experts are well aware that there is no single measure ("no silver bullet") that provides absolute cyber...

The 13 November attacks on Paris have demonstrated that Western countries are not secure against the terrorist threat. One possibility keeping many awake at...

  In the old days of the home computing, malware - viruses, computer worms, and trojan horses - ranged from the relatively harmless prank to...

As we have previously reported, the Internet of Things (IoT) may be on the brink of changing our lives - but before that happens...

  Chinese state-sponsored hacking of US computer networks has been a frequent feature in headlines in recent years. In this case, Chinese cyber attackers have...

Medical devices may not be ever-present in headlines, but that does not mean no new developments in the field happen. Rather, in recent years...

Labour’s former Defence Secretary Lord Browne warns of severe risk to Britain’s nuclear deterrent unless “weak spots” are protected. If such security holes as...

Threats from terrorist organisations and belligerent states are numerous. They range from terrorist attacks, like we have seen in Paris, through offensive operations similar...

Ariel University is currently establishing a training center for cyber protectors based on technology by Cyberbit, a subsidiary of Elbit Systems. The center will be...

We have written before about China building its own secure smartphone ecosystem - including a homegrown operating system and even processing chips - all...

Improved security was touted as one of the main advantages of Windows 10 over previous versions, as well as Microsoft’s newly launched Edge browser...

You’d think that as an agency tasked with security, the Department of Homeland Security (DHS) would be for the challenge of maintaining its own...

In an effort to combat identity theft and fraud in the country, India is launching a new biometric database - the world’s largest. With...

Latest