Lockheed Martin partners with Israel on national cyber curriculum
Collaboration Focused on Developing Next-Generation Workforce.
The Israeli Ministry of Education has partnered with Lockheed Martin to...
Hacking into computer systems in order to gain remote access to the data they store requires first and foremost communication. There are various methods...
The secret hacking tactics of Canada’s intelligence agency
Canada’s electronic surveillance agency has secretly developed an arsenal of cyber weapons capable of stealing data and...
Earlier this month, two indictments were brought against two Vietnamese citizens residing in the Netherlands, for their respective roles in hacking email service providers...
Register to iHLS Israel Homeland Security
In this weekly Video report (March 24th 2015):
Turkey and ISIS – more than meets the eye
US Navy resting exoskeletons
ISIS’s...
Anonymous is perhaps the most notorious of all hacker groups. It is a decentralized online community of tens of thousands of anonymous 'hacktivists', who...
One of the world’s fastest growing technological fields is called ’Lawful Interception’, namely enforcing the law in cyberspace and gathering cyber intelligence, as well...
This unmanned helicopter is designed to feature protection from hacking.
Boeing is set to replace 100,000 lines of code on its Little Bird drone before...
Voice biometrics, fingerprints, iris scans, and other authentication options are beginning to replace passwords as a means to verify a user's identity and simplify...
Britain’s cyber unit for soldiers familiar with social media.
Documents leaked by Edward Snowden demonstrate that the NSA and its allies are preparing for future...
Organizations and business are increasingly turning towards cloud computing in order to streamline their operations and to enable their employees an easier and more...
Register to iHLS Israel Homeland Security
In this weekly Video report (March 17th 2015):
Converted Prop Guns Are Assassins’ Weapon of Choice
Robot Firefighter Puts Out Its...
The aviation industry is slow in responding to the threat posed by cyber criminality. This, whether it is posed by criminals, terrorists, nation states,...
Supporters of the terrorist group, Islamic State of Syria and Iraq, popularly known as ISIS, used at least 46,000 Twitter accounts from September through...
A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according to a report from...
Kaspersky Lab reveals latest cyberespionage tactics: complexity and modularity VS functionality.
Nation-state sponsored cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex,...
North Korea is targeting infrastructure in the west by Cyber attacks.
According to various reports, North Korea has a team of roughly 3,000 cyber soldiers....
The country’s air traffic control systems are vulnerable to hackers. This, according to a 42-page document entitled "Information Security: FAA Needs to Address Weaknesses...