Iran Is Challenging IoT Security
As we have previously reported, the Internet of Things (IoT) may be on the brink of changing our lives - but before that happens...
Cyber collaboration
Lockheed Martin partners with Israel on national cyber curriculum
Collaboration Focused on Developing Next-Generation Workforce.
The Israeli Ministry of Education has partnered with Lockheed Martin to...
More IoT For The DoD
Armed insurgents regularly use commercial drones to keep track of the movements of adversaries and US soldiers. American troops on the frontlines, however, can’t...
New CyberSecurity Service Revealed
Although efforts continue to find autonomous solutions to cybersecurity, some companies believe that the human factor has still been important.
IBM Security announced the formation...
The dangers of Internet-of-Things in Healthcare
The medical technologies have been taking a giant leap in the past years, producing instruments that can monitor, store and transmit data on one’s...
International cyber terror: Lizard Squad strikes back
The hacking group known as Lizard Squad has been making quite a nuisance of itself, associating the hackers with two high profile events. Lizrad...
What to Expect From Tomorrow’s Conference?
While each person might define it in different terms, Big Data is basically this: A collection of data from traditional and digital sources for...
Call For Proposals For Startups In Defense and HLS Fields
iHLS, the global media leader in security technology, is inviting entrepreneurships in this field to join the second cycle of the world first accelerator...
Biometrics – The Solution for IoT Security
Biometrics and IoT (Internet of Things) technologies represent a symbiotic match that together will drive further IoT adoption, according to techzone360.com evaluation.
The IoT market...
Smartphone vs. Big Brother
We are all understandably ’hysterical’ about maintaining our privacy. There is no doubt this is a burning, crucial issue. Nevertheless, we ought to bear...
Mirai Botnet Source Code Unveiled
Security researchers have come across the source code for the Internet of Things botnet called Mirai. This botnet has been used to launch major...
New Partnership in Video Security Applications Field
Video surveillance market this year has been characterized by the move from standard-definition (SD) analog equipment to high-definition (HD) CCTV and network equipment, aggressive...
IoH – Internet of Humans
By Avi Yariv
A few weeks ago I heard a presentation of CEO of a leading Israeli company, developing technologies for IoT – the new...
Ransomware Threatens IoT Devices
Ransomware attack is one of the scenarios that security experts have been worrying about regarding the widening use of the Internet of Things. It...
Towards the IoT Conference
The Internet of Things (IoT) is an innovative field developing rapidly. In daily life it is about connecting computers and various smart devices such...
Cyber attacks will grow in number in 2015
2015 will see an increase in Cyber Warfare incidents.
McAfee Labs' 2015 Threats Predictions report sees increased cyber-warfare and espionage, along with new strategies from...
The Internet of Criminal Justice
The American research institute RAND has published a research according to which internet-based technologies could aid criminal justice agencies and law enforcement in general...
Law Enforcement and National Security vs. Global Business Interests
Yoram Hacohen
Three interesting processes are underway as a direct result of Edward Snowden’s revelations about the extent of the access by US security services...
Privacy vs. Technology
Would you agree giving up your privacy in exchange for a more comfortable life? Judging by the way our society looks today, it seems...
Challenges in Internet-Connected Battlefield
The US military has been facing various challenges in internet-connected, robot-rich congested and contested battlefields. In search for solutions, the U.S. Army Research Laboratory...
A new threat: North Korean cyber attack on Western critical infrastructure
North Korea is targeting infrastructure in the west by Cyber attacks.
According to various reports, North Korea has a team of roughly 3,000 cyber soldiers....
How Companies “See” End-Devices on Networks?
IPM, an IT company, and ForeScout Technologies Inc., an agentless and Internet of Things (IoT) cybersecurity company, announced that they have partnered to deliver...












































