The aviation industry is slow in responding to the threat posed by cyber criminality. This, whether it is posed by criminals, terrorists, nation states,...
Supporters of the terrorist group, Islamic State of Syria and Iraq, popularly known as ISIS, used at least 46,000 Twitter accounts from September through...
A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according to a report from...
Kaspersky Lab reveals latest cyberespionage tactics: complexity and modularity VS functionality.
Nation-state sponsored cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex,...
North Korea is targeting infrastructure in the west by Cyber attacks.
According to various reports, North Korea has a team of roughly 3,000 cyber soldiers....
The country’s air traffic control systems are vulnerable to hackers. This, according to a 42-page document entitled "Information Security: FAA Needs to Address Weaknesses...
We are all understandably ’hysterical’ about maintaining our privacy. There is no doubt this is a burning, crucial issue. Nevertheless, we ought to bear...
Register to iHLS Israel Homeland Security
In this weekly Video report (March 10th 2015):
Cyber in the IDF: Warfare and Security
Terrorism Finance: Experts Worry ISIS Already...
The French government has asked leading social media and tech firms, Google, Facebook, and Twitter to work directly with French law enforcement agencies in...
Following its official announcement last Friday, admitting its database was hacked, Uber has been taking legal action. The transport solutions app is pursuing legal...
Register to iHLS Israel Homeland Security
In this weekly Video report (March 3rd 2015):
The international campaign against ISIS
Bad Iran Deal in the Offing
Innovative Face Recognition...
A surprise cyber attack on U.S critical infrastructure – an imminent scenario?
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11...
Cyber crime, aka e-Crime, presents a highly complex and sophisticated threat that has been evolving rapidly recently. The unfolding legitimate cyber world makes for...
Register to iHLS Israel Homeland Security
In this weekly Video report (February 24th 2015):
Israeli System Intercepts Cloud Stored Data
US Marine Corps Wants New Unmanned Tank
A...
The U.S. government is warning Lenovo users they must remove an adware (advertising-supported software) called ’Superfish’ from their digital platforms.
The Department of Homeland Security...
The IDF is preparing for cyberwars to come. The Northern Command has recently inaugurated a cyber security array; the IAF has been practicing various...
DHS officials responsible for protecting federal civilian networks and critical industries from cyberattacks have recently referred to this issue. They said they are going...