Industrial Security

Industrial Security

As we have previously reported, the Internet of Things (IoT) may be on the brink of changing our lives - but before that happens...

Medical devices may not be ever-present in headlines, but that does not mean no new developments in the field happen. Rather, in recent years...

For years digital security experts have worried over possible backdoors implemented into equipment manufactured at Chinese factories. Over the years there have been several...

The Internet of Things (IoT) is growing rapidly. The number of internet-connected devices is expected to hit 6.4 billion in 2016, and to surpass...

Trend Micro, a global leader in security information solutions, presents its annual security information forecast report. The expected trends include a rise in online...

The Obama administration and lawmakers are looking to South Korea to help thwart Pyongyang’s attempts to upgrade and strengthen its cyber capabilities. The country’s...

Last month President Barack Obama said that the U.S. would be “watching closely” to see if “words are followed by actions” after he and...

The last few weeks saw a number of financial companies become a target for cyber attacks and attempted blackmail using threats. The companies attacked...

At the beginning of October Siemens introduced RailFusion - a software designed to make our trains infrastructures safer and more efficient. This new software, already at...

The European Court of Justice (ECJ) in Luxembourg has ruled that U.S. digital data storage systems fail to provide sufficient privacy from state surveillance. According...

Food safety is a growing concern, and the World Health Organization claims that nearly three-quarters of new infectious diseases are communicable between animals and...

The Internet of Things (IoT) is network of uniquely identifiable endpoints (or "things" that communicate without human interaction using IP (Internet Protocol) connectivity. The...

A new chip built on strained glass can shatter within 10 seconds when remotely triggered. Such technology could prove tremendously useful for the U.S....

James Clapper, director of U.S. intelligence, and other senior intelligence officers, have warned Congress that the next phase of escalating online data theft will...

The Internet of Things (IoT) trend - connecting our apartments, cars, hospitals or anything else to the internet - is picking up, making the...

Have you ever stopped to think why defense companies have a classified network to prevent cyber attack, whereas companies handling our critical systems -...

Israel Aerospace Industries (IAI) was recently awarded a contract by the Israel National Cyber Bureau in the Prime Minister's Office, to establish an innovative...

If a hacker is capable of breaking in to our computer systems, with a little more effort surely they could disrupt larger targets as...

The field of unmanned aviation is becoming even more central around the world. Many countries are using Unmanned aerial vehicles for operational needs, both...

The rush to automate more factory processes may look like it’s saving money, but to Ken Westin, a senior security analyst at Tripwire, it’s...

Researchers from the  Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies...

U.S. Army War College in Carlisle, Pa. has grouped together the best minds on cyber in order to brainstorm and create a new defense...