Cyber

Cyber

The aviation industry is slow in responding to the threat posed by cyber criminality. This, whether it is posed by criminals, terrorists, nation states,...

Supporters of the terrorist group, Islamic State of Syria and Iraq, popularly known as ISIS, used at least 46,000 Twitter accounts from September through...

A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according to a report from...

Kaspersky Lab reveals latest cyberespionage tactics: complexity and modularity VS functionality. Nation-state sponsored cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex,...

North Korea is targeting infrastructure in the west by Cyber attacks. According to various reports, North Korea has a team of roughly 3,000 cyber soldiers....

The country’s air traffic control systems are vulnerable to hackers. This, according to a 42-page document entitled "Information Security: FAA Needs to Address Weaknesses...

No less than six new malware are born each second. This, according to a recent report on various cyber threats. The report focuses on the...

We are all understandably ’hysterical’ about maintaining our privacy. There is no doubt this is a burning, crucial issue. Nevertheless, we ought to bear...
video

Register to iHLS Israel Homeland Security In this weekly Video report (March 10th 2015): Cyber in the IDF: Warfare and Security Terrorism Finance: Experts Worry ISIS Already...

An extra $400 million next year for cyber security projects in the U.S Leaders of the U.S. Department of Defense (DoD) plan to boost their...

This threat is an imminent - and the U.S is not ready. A New York financial regulator recently said he is considering new rules to...

Cyber warfare is a growing an imminent threat on the U.S. The Central Intelligence Agency (CIA) is planning to join the growing list of...
video

The French government has asked leading social media and tech firms, Google, Facebook, and Twitter to work directly with French law enforcement agencies in...

Following its official announcement last Friday, admitting its database was hacked, Uber has been taking legal action. The transport solutions app is pursuing legal...
video

Register to iHLS Israel Homeland Security In this weekly Video report (March 3rd 2015): The international campaign against ISIS Bad Iran Deal in the Offing Innovative Face Recognition...

A surprise cyber attack on U.S critical infrastructure – an imminent scenario? Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11...

Cyber crime, aka e-Crime, presents a highly complex and sophisticated threat that has been evolving rapidly recently. The unfolding legitimate cyber world makes for...

Register to iHLS Israel Homeland Security In this weekly Video report (February 24th 2015): Israeli System Intercepts Cloud Stored Data US Marine Corps Wants New Unmanned Tank A...

The U.S. government is warning Lenovo users they must remove an adware (advertising-supported software) called ’Superfish’ from their digital platforms. The Department of Homeland Security...

The IDF is preparing for cyberwars to come. The Northern Command has recently inaugurated a cyber security array; the IAF has been practicing various...

Financial and terror experts are concerning about the ability to move cash around national borders could help ISIS fund attacks in the West. This...

DHS officials responsible for protecting federal civilian networks and critical industries from cyberattacks have recently referred to this issue. They said they are going...