PM Netanyahu: Israeli cyber has glorious future, but faces horrible threats. How do we protect airplanes, networks, anything electronic

Map. History of Cyberwar conflict

21 August 2018
Unna: launching new Israeli cyber bill today to formalize newish cyber agency which has combined securing Israeli cyberspace with developing long-term Israeli cyber strategy
PM Netanyahu: Our airlines and fighter planes can be brought down. Cyber creating unimaginable benefits in many areas, but also vulnerable in all the new eras
PM Netanyahu: Cyber creating new industries and creates own demand, Precision agriculture, drones in sky-can target water, fertilizer down to individual plant. Smart mobility - 500 tech cos huge progress, digital health - 1 billion shekels govt invest
PM Netanyahu: Cyber is ever-present race. We can do it, but increasing challenge. We are absolutely committed to protect ourselves, others cyber challenges. Israel gets 20% of global investment in cyber security. Punching 200x above weight
PM Netanyahu: States can cripple our most sensitive systems, can takeover vital systems. Not theoretical, already happened in the present. Threats even to our weapons
PM Netanyahu: Israeli cyber has glorious future, but faces horrible threats. How do we protect airplanes, networks, anything electronic
A sophisticated hacking campaign launched from computers in China burrowed deeply into satellite operators, defense contractors and telecommunications companies in the United States and southeast Asia, security researchers at Symantec Corp said
2 month ago
Hackers hit South Korean cryptocurrency exchange Bithumb, bitcoin falls
2 month ago
Cryptocurrency exchange Bithumb says more than $31 million worth of coins has been stolen
Parliament demands EU institutions ban Kaspersky Lab cybersecurity products
2 month ago
Former CIA employee Joshua Adam Schulte charged with sending thousands of classified documents to WikiLeaks
Launch of $93M Huawei-installed AdenNet ISP and 4G services this week will transfer control of Yemen's internet access architecture from Houthi-run capital Sanaa to temp capital Aden city.
2 month ago
US warns of North Korea cyber campaign, days after historic summit
Ukrainian police arrest suspect behind DDoS attacks
Bitcoin is extending its decline
Google working on switching to Python 3 as the default language of GAE/Python
Cyberpolice says about many "VPN Filter" virus attacks in Southern Ukraine, in Odesa, Mykolaiv and Kherson regions
U.S. counterintelligence official warns World Cup travellers' devices could be hacked
2 month ago
Belarus: Draft legislation under consideration will end anonymous posting, require website owners to moderate user comments and allow for social media networks to be blocked if they are considered to have violated the new rules
2 month ago
Vietnam lawmakers approve cyber law clamping down on tech firms, dissent
North Korea increases its reliance on Russian Internet transit ahead of historic SingaporeSummit. exclusively routed through Russian telecom @ttk_ru. (First activated in Oct 2017)
New US sanctions targeting Russian cyber operations.
U.S. net neutrality rules officially end after Congress failed to intervene
In July I plan to sign a new joint declaration with @eucopresident Donald Tusk and EU Commission President @JunckerEU continuing to address most pressing security challenges – @jensstoltenberg
NATO and EU have made substantial progress on hybrid and cyber, maritime operations, fighting terrorism, exercises and military mobility – @jensstoltenberg
Philippines Police release over 400 Filipinos arrested in Pampanga for suspected cybercrime
Facebook is hiring 'news credibility specialists' — after saying it didn't want to be in the business of judging news trustworthiness
Google pledges not to use artificial intelligence for weapons
We will discuss our progress in cyber defence, maritime security + our efforts to achieve more defence spending - @jensstoltenberg
2 month ago
New Guardian exclusive. Cambridge Analytica director 'met Assange to discuss US election and channeled cryptocurrency to Wikileaks'
We respect your privacy. Our website is using cookies for 3rd party advertising, analytics, language and user settings. By continuing to browse our site you agree to our use of cookies, Privacy Policy and Terms of Service.
I agree