Cyber

Cyber

Lockheed Martin partners with Israel on national cyber curriculum Collaboration Focused on Developing Next-Generation Workforce. The Israeli Ministry of Education has partnered with Lockheed Martin to...
video

Hacking into computer systems in order to gain remote access to the data they store requires first and foremost communication. There are various methods...

The secret hacking tactics of Canada’s intelligence agency Canada’s electronic surveillance agency has secretly developed an arsenal of cyber weapons capable of stealing data and...

Earlier this month, two indictments were brought against two Vietnamese citizens residing in the Netherlands, for their respective roles in hacking email service providers...

So far, the rising budgets on Data Security do not seem to inspire greater confidence in the results. A new report looking at how organizations...
video

Register to iHLS Israel Homeland Security In this weekly Video report (March 24th 2015): Turkey and ISIS – more than meets the eye US Navy resting exoskeletons ISIS’s...

Anonymous is perhaps the most notorious of all hacker groups. It is a decentralized online community of tens of thousands of anonymous 'hacktivists', who...

One of the world’s fastest growing technological fields is called ’Lawful Interception’, namely enforcing the law in cyberspace and gathering cyber intelligence, as well...

Increasing cyber threats worldwide have been posing a menace to numerous sectors. It seems the global perplexion knowns no bounds when it comes to...

The hacking group known as Lizard Squad has been making quite a nuisance of itself, associating the hackers with two high profile events. Lizrad...

This unmanned helicopter is designed to feature protection from hacking. Boeing is set to replace 100,000 lines of code on its Little Bird drone before...

Voice biometrics, fingerprints, iris scans, and other authentication options are beginning to replace passwords as a means to verify a user's identity and simplify...

Britain’s cyber unit for soldiers familiar with social media. Documents leaked by Edward Snowden demonstrate that the NSA and its allies are preparing for future...

Organizations and business are increasingly turning towards cloud computing in order to streamline their operations and to enable their employees an easier and more...
video

Register to iHLS Israel Homeland Security In this weekly Video report (March 17th 2015): Converted Prop Guns Are Assassins’ Weapon of Choice Robot Firefighter Puts Out Its...

The aviation industry is slow in responding to the threat posed by cyber criminality. This, whether it is posed by criminals, terrorists, nation states,...

Supporters of the terrorist group, Islamic State of Syria and Iraq, popularly known as ISIS, used at least 46,000 Twitter accounts from September through...

A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according to a report from...

Kaspersky Lab reveals latest cyberespionage tactics: complexity and modularity VS functionality. Nation-state sponsored cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex,...

North Korea is targeting infrastructure in the west by Cyber attacks. According to various reports, North Korea has a team of roughly 3,000 cyber soldiers....

The country’s air traffic control systems are vulnerable to hackers. This, according to a 42-page document entitled "Information Security: FAA Needs to Address Weaknesses...

No less than six new malware are born each second. This, according to a recent report on various cyber threats. The report focuses on the...

Latest