IT security: does more money mean better results?
So far, the rising budgets on Data Security do not seem to inspire greater confidence in the results.
A new report looking at how organizations...
iHLS TV Weekly Video Report – March 24th 2015
Register to iHLS Israel Homeland Security
In this weekly Video report (March 24th 2015):
Turkey and ISIS – more than meets the eye
US Navy resting exoskeletons
ISIS’s...
Which are the most notorious hacking groups?
Anonymous is perhaps the most notorious of all hacker groups. It is a decentralized online community of tens of thousands of anonymous 'hacktivists', who...
Lawful interception
One of the world’s fastest growing technological fields is called ’Lawful Interception’, namely enforcing the law in cyberspace and gathering cyber intelligence, as well...
Cyber: closer US-Israeli cooperation
Increasing cyber threats worldwide have been posing a menace to numerous sectors. It seems the global perplexion knowns no bounds when it comes to...
International cyber terror: Lizard Squad strikes back
The hacking group known as Lizard Squad has been making quite a nuisance of itself, associating the hackers with two high profile events. Lizrad...
Pentagon to Launch Hacker Proof Helicopter Drone by 2018
This unmanned helicopter is designed to feature protection from hacking.
Boeing is set to replace 100,000 lines of code on its Little Bird drone before...
Could biometric based security make passwords obsolete?
Voice biometrics, fingerprints, iris scans, and other authentication options are beginning to replace passwords as a means to verify a user's identity and simplify...
UK Announces Creation of the 77th Cyber warfare Battalion
Britain’s cyber unit for soldiers familiar with social media.
Documents leaked by Edward Snowden demonstrate that the NSA and its allies are preparing for future...
Cloud computing: cyber security breaches attract hackers
Organizations and business are increasingly turning towards cloud computing in order to streamline their operations and to enable their employees an easier and more...
NSA Surveillance Software Infecting Thousands of Computers Worldwide
A sophisticated spying campaign infected tens of thousands of computers worldwide with surveillance software, some embedded in hard drives, according to a report from...
Cyberespionage tactics
Kaspersky Lab reveals latest cyberespionage tactics: complexity and modularity VS functionality.
Nation-state sponsored cyberespionage attacks are becoming more sophisticated, targeting carefully defined users with complex,...
A new threat: North Korean cyber attack on Western critical infrastructure
North Korea is targeting infrastructure in the west by Cyber attacks.
According to various reports, North Korea has a team of roughly 3,000 cyber soldiers....
Wireless Charging
Have we completely given up on privacy?
When it comes to wireless charging, aka wireless power, the answer is probably ’yes’.
Though they have become indispensable...
Air Traffic Control System Vulnerable to Cyberattack
The country’s air traffic control systems are vulnerable to hackers. This, according to a 42-page document entitled "Information Security: FAA Needs to Address Weaknesses...
Smartphone vs. Big Brother
We are all understandably ’hysterical’ about maintaining our privacy. There is no doubt this is a burning, crucial issue. Nevertheless, we ought to bear...
First responders’ technology prize to be awarded by DHS
U.S DHS launches $25K prize for innovative ways to track first responders indoors during incidents.
The Homeland Security Department's research and development arm announced it...
Equation Group: The Crown Creator of Cyber-Espionage
Kaspersky Lab discovers the ancestor of Stuxnet and Flame – powerful threat actor with an absolute dominance in terms of cyber-tools and techniques.
For several...
Obama’s $14 billion cybersecurity initiatives for the 2016 budget
American companies welcome next year's budget for Cyber security. Massachusetts cyber security firms applauded President Barack Obama proposed $14 billion allocation toward cybersecurity initiatives...
Israeli system intercepts cloud-stored data
Nowadays, everything is available at the palm of our hand. Nevertheless, these amazing capabilities, combined with our instinctive fear of the "Big Sister Syndrome"...
iHLS TV Weekly Video Report – February 3rd 2015
Register to iHLS Israel Homeland Security
In this weekly Video report (February 3rd 2015):
Coalition against Isis: Too Little Too Late
Kaspersky Technology Forecast for 2045
The US...
The weak areas of US federal facilities’ Cyber protection
The U.S. is realizing step by step to what degree it is vulnerable to Cyber attacks.
According to HomeLand Security News Wire, while most cybersecurity...