Cyber

Cyber

Following reports on Israel’s involvment in planting a spy software in the hotels where the nuclear talks took place, I-HLS was given the professional...

Malcolm Frost, the United States Army  spokesman, admitted that a few days ago the official website of the Army was hacked. A group of...

In the last two months, there is an ongoing governmental investigation trying to figure out the identity and the way someone was able to...

The right for privacy or the general interest to safeguard the public's privacy – which one wins in case of a clash? After failing...

ISIS is the most prominent and most successful terror organization that exists today. Apart from its cruelty, its most prominent ability is the way...

Brazil's military approach to cyber insecurity is consistent with a broader effort to find a role for the Brazilian armed forces in the 21st...

Ten Israeli security firms have offered to provide security consultancy, intelligence and counter-terrorism expertise to Kenyan government and private security following a series of...

The hackers are everywhere. A string of high-profile hacks — the most recent on President Obama’s personal email account — have made cybercrime an...

Smartphone technology built by Lockheed Martin promises to verify a user's identity based on the swiftness and shape of the individual’s finger strokes on...

Israeli experts say that this claim has to be investigated further but add that is was clear the the connectivity on passenger aircraft is...

The U.S Navy has kicked off a project to collaborate with outside scientists on research and development that will help protect the branch’s flying...

During 2014, the Israeli defense  industries signed new contracts, valued at  5.66 billion dollars. The Israeli defense industry, ranked among the top 10 leading defense...

Participants across 16 Industries, Including Five of World's Top 10 banks, Six of Top 10 retailers, Use IBM X-Force Exchange Threat Intelligence IBM (NYSE: IBM)...

A new report details a malicious and largely unknown targeted attacks on oil tankers. First discovered in January 2014, the ongoing attacks on oil...

Elbit Systems Ltd. announced today that it has signed an agreement to acquire  NICE Systems Cyber and Intelligence division for a total amount of...

The Penn State College of Engineering has been the target of two sophisticated cyber attacks conducted by so-called “advanced persistent threat” actors. Experts have confirmed...

Four Australians were among 21 people arrested as part of a six-month international Homeland Security sting. Two people from the were charged with buying illegal...

Real-world teleoperated robots, which are controlled by a human who may be in another physical location, are expected to become more commonplace as the...

The Department of Homeland Security’ Office of Biometric Identity Management is currently looking for off-the-shelf applications that can more effectively store, match and analyze...

The Chinese military said fitness trackers and watches could send private and strategic data to hackers who've gained access to the vulnerable devices. China...

The need for cybersecurity solutions and experts is going to grow as more companies such as Sony Pictures, Target, Home Depot, and Chase are...

The US electrical grid remains alarmingly vulnerable to a variety of cyber threats. Judging by the number and type of cyber incidents reported to...

Latest