Cyber

Cyber

Labour’s former Defence Secretary Lord Browne warns of severe risk to Britain’s nuclear deterrent unless “weak spots” are protected. If such security holes as...

Threats from terrorist organisations and belligerent states are numerous. They range from terrorist attacks, like we have seen in Paris, through offensive operations similar...

Ariel University is currently establishing a training center for cyber protectors based on technology by Cyberbit, a subsidiary of Elbit Systems. The center will be...

We have written before about China building its own secure smartphone ecosystem - including a homegrown operating system and even processing chips - all...

Improved security was touted as one of the main advantages of Windows 10 over previous versions, as well as Microsoft’s newly launched Edge browser...

You’d think that as an agency tasked with security, the Department of Homeland Security (DHS) would be for the challenge of maintaining its own...

In an effort to combat identity theft and fraud in the country, India is launching a new biometric database - the world’s largest. With...

For years digital security experts have worried over possible backdoors implemented into equipment manufactured at Chinese factories. Over the years there have been several...

The Internet of Things (IoT) is growing rapidly. The number of internet-connected devices is expected to hit 6.4 billion in 2016, and to surpass...

Cyber attacks are where the modern battles take place: Military cyber attacks, like those used by Russia during its invasion of Georgia or political...

In a shocking breach of security, multiple police body cams manufactured by Martel Electronics have been found to be infected with one of the...

Paz Shabtai Following the Paris attacks, apparently planned under the noses of French and Belgian authorities, one possibility is that Islamic State militants have found...
anonymousvideo

Following Anonymous’ declaration of “total war” on ISIS, the hacktivist collective reports taking down more than 5,500 Twitter accounts belonging to ISIS members. Details...

The UEFA European Football Championship is one of the world’s most prestigious football tournaments, second only to the World Cup. The competition is held...

It is now widely known that governments the world over eavesdrop on citizens’ electronic communication. Until last year, governmental spying was thought to be...

In an effort to increase cooperation and shared cyber defence capabilities between allies, NATO Assistant Secretary General Ambassador Sorin Ducaru and Czech Director of...

Facebook has released its biannual report on government data requests, indicating that total law enforcement requests are at their highest level ever at 41,214...

Gad Elkin, EMEA Security Information Director, F5 DDoS and ransomware are two well-established methods for cyber attacks, but a newly appeared tactic combines elements of...

Paz Shabtai While around 250 Jihadists have returned to France from Syria, England is reported to expect almost double that. As of now, MI5 and...

Several high-profile, suspected government-backed cyber attacks on the US might have caused a bit of a shift in the American combat strategy. After countless...

Due to recent events - terror attacks in Europe, Africa and the Middle East and terror threats and alerts in most parts of the...

In a cost-saving move, Pentagon contractors subcontracted their work to the Russians, a four-year probe concludes. The probe was started in 2011 after John C...