Labour’s former Defence Secretary Lord Browne warns of severe risk to Britain’s nuclear deterrent unless “weak spots” are protected. If such security holes as...
Threats from terrorist organisations and belligerent states are numerous. They range from terrorist attacks, like we have seen in Paris, through offensive operations similar...
Ariel University is currently establishing a training center for cyber protectors based on technology by Cyberbit, a subsidiary of Elbit Systems. The center will be...
We have written before about China building its own secure smartphone ecosystem - including a homegrown operating system and even processing chips - all...
For years digital security experts have worried over possible backdoors implemented into equipment manufactured at Chinese factories. Over the years there have been several...
Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...
Paz Shabtai
Following the Paris attacks, apparently planned under the noses of French and Belgian authorities, one possibility is that Islamic State militants have found...
Following Anonymous’ declaration of “total war” on ISIS, the hacktivist collective reports taking down more than 5,500 Twitter accounts belonging to ISIS members. Details...
The UEFA European Football Championship is one of the world’s most prestigious football tournaments, second only to the World Cup. The competition is held...
It is now widely known that governments the world over eavesdrop on citizens’ electronic communication. Until last year, governmental spying was thought to be...
In an effort to increase cooperation and shared cyber defence capabilities between allies, NATO Assistant Secretary General Ambassador Sorin Ducaru and Czech Director of...
Facebook has released its biannual report on government data requests, indicating that total law enforcement requests are at their highest level ever at 41,214...
Gad Elkin, EMEA Security Information Director, F5
DDoS and ransomware are two well-established methods for cyber attacks, but a newly appeared tactic combines elements of...
Several high-profile, suspected government-backed cyber attacks on the US might have caused a bit of a shift in the American combat strategy. After countless...
In a cost-saving move, Pentagon contractors subcontracted their work to the Russians, a four-year probe concludes.
The probe was started in 2011 after John C...