The Jerusalem Post | JPost.com

Share

Despite years of negotiations, countries have been unable to agree on what kind of cyber hacking activities violate international law, one of the world’s leading cyber-warfare law experts told The Jerusalem Post during his current visit to Israel. Michael Schmitt is not only the lead author of the Tallinn Manuals, the most influential international...

Cyber warfare and cybercrimes have become an everyday part of life for governments and companies across the world. The media has covered some of the cyber-attacks that have led to the leaking of personal data and then there is WikiLeaks of course, established by Julian Assange in late 2006. Governments will be particularly eager to, not only avoid...

Security cameras infected with malicious software can use infrared light to receive covert signals and leak sensitive information from the very surveillance devices that are used to protect facilities, according to a method developed by cyber researchers at Ben-Gurion University of the Negev in Beersheba. According to the researchers, the method...

In its quest for top cybersecurity talent, the IDF is conducting training at the high school level for the Intelligence Corps’s prestigious Unit 8200 Central Collection group. The program at Ort High School Holon helps to develop the next generation of online soldiers for what is one of the IDF’s highest demanded units. Unit 8200 alumni are...

The Science and Technology Ministry and the biometric identification and applications unit at the National Cyber ​​Bureau has issued a call for proposals for biometric and identification research and development totaling NIS 1.8 million. Each project will receive funding of NIS 450,000 for a period of up to three years. The aim of the project is to...

The US Army has ordered all troops to immediately stop using consumer drones manufactured by Chinese tech company DJI citing operational risks associated with the popular drone, also set to be delivered to the Israeli army this month. In a memo obtained by sUAS News, Lt. Gen. Joseph H. Anderson, the Army’s Deputy Chief of Staff for Plans and...

As Internet-based innovation becomes increasingly accessible to the wider public, those determined to conceal illegally obtained funds can now do so in broad daylight, rather than turning to the remote corners of the dark web. “We now live in the unbelievable reality where anyone who wants to launder money can very, very easily do it through...

Israel and Western countries should be prepared to protect their computer systems by cyber attacking rogue adversaries’ infrastructure if necessary, Matthew Devost, a top cybersecurity expert, told The Jerusalem Post. Devost is managing director of Accenture Cyber Security Devost and a former US defense official. Back in Cold War days, there was...