Cloud based security systems – the Israeli innovation

0
In recent years, cloud based security systems have become the last word in security. It is hardly surprising that Israel is home to numerous...

The device that will protect your vehicle from “Sticky bombs”

0
By: Eyal Avidov   So called ’Sticky bombs’ are becoming a global threat and are commonly used by terror groups, local mafia and other para-military organizations....

Online Fraud and Security Attacks

0
F5 Helps Global Enterprises Counter Online Fraud and Security Attacks New Security Operations Center improves efficiency, shortens response time, and decreases IT overhead by providing...

Big Data Solution: Simplicity and technological excellence

0
Organizations the world over have already been taking into account that Data with a capital D is the organization’s primary asset, and that consequently,...

iHLS TV Weekly Video Report – March 31st 2015

0
Register to iHLS Israel Homeland Security In this weekly Video report (March 31st 2015): Missile Defense: US Unveils Innovative AEGIS System ISIS Recruiting In New York The Threat:...

Cyber collaboration

0
Lockheed Martin partners with Israel on national cyber curriculum Collaboration Focused on Developing Next-Generation Workforce. The Israeli Ministry of Education has partnered with Lockheed Martin to...

BitWhisper

0
Hacking into computer systems in order to gain remote access to the data they store requires first and foremost communication. There are various methods...

Is Canada a cyber-superpower?

0
The secret hacking tactics of Canada’s intelligence agency Canada’s electronic surveillance agency has secretly developed an arsenal of cyber weapons capable of stealing data and...

Three Charged with One of the Largest Reported Data Breaches in...

0
Earlier this month, two indictments were brought against two Vietnamese citizens residing in the Netherlands, for their respective roles in hacking email service providers...

IT security: does more money mean better results?

0
So far, the rising budgets on Data Security do not seem to inspire greater confidence in the results. A new report looking at how organizations...

iHLS TV Weekly Video Report – March 24th 2015

0
Register to iHLS Israel Homeland Security In this weekly Video report (March 24th 2015): Turkey and ISIS – more than meets the eye US Navy resting exoskeletons ISIS’s...

Which are the most notorious hacking groups?

0
Anonymous is perhaps the most notorious of all hacker groups. It is a decentralized online community of tens of thousands of anonymous 'hacktivists', who...

Lawful interception

0
One of the world’s fastest growing technological fields is called ’Lawful Interception’, namely enforcing the law in cyberspace and gathering cyber intelligence, as well...

Cyber: closer US-Israeli cooperation

0
Increasing cyber threats worldwide have been posing a menace to numerous sectors. It seems the global perplexion knowns no bounds when it comes to...

International cyber terror: Lizard Squad strikes back

0
The hacking group known as Lizard Squad has been making quite a nuisance of itself, associating the hackers with two high profile events. Lizrad...

Pentagon to Launch Hacker Proof Helicopter Drone by 2018

0
This unmanned helicopter is designed to feature protection from hacking. Boeing is set to replace 100,000 lines of code on its Little Bird drone before...

Could biometric based security make passwords obsolete?

0
Voice biometrics, fingerprints, iris scans, and other authentication options are beginning to replace passwords as a means to verify a user's identity and simplify...

UK Announces Creation of the 77th Cyber warfare Battalion

0
Britain’s cyber unit for soldiers familiar with social media. Documents leaked by Edward Snowden demonstrate that the NSA and its allies are preparing for future...

Cloud computing: cyber security breaches attract hackers

0
Organizations and business are increasingly turning towards cloud computing in order to streamline their operations and to enable their employees an easier and more...

NSA Surveillance Software Infecting Thousands of Computers Worldwide

0
A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according to a report from...

Cyberespionage tactics

0
Kaspersky Lab reveals latest cyberespionage tactics: complexity and modularity VS functionality. Nation-state sponsored cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex,...

A new threat: North Korean cyber attack on Western critical infrastructure

0
North Korea is targeting infrastructure in the west by Cyber attacks. According to various reports, North Korea has a team of roughly 3,000 cyber soldiers....

Latest

image provided by pixabay

Ukraine’s New “Sea Baby” – A Rocket-Armed Kamikaze Marine Drone

0
The Security Service of Ukraine (SBU) has recently unveiled its brand-new rocket-armed unmanned surface vessel (USV). This upgraded kamikaze naval drone called “the Sea...