October is Cyber Security Awareness Month. Today I’d like to highlight PHISHING! The ubiquitous cyber attack category that has been around since the dawn of the Internet & Networked Technology. Remember These? 500 Hours FREE AOL Discs? PHISHING and the various techniques employed to successfully execute a PHISH (like much of the Cyber Security Landscape) […]
Another day. Another Brilliant Israeli Tech Startup. ?? Fascinating stuff. Most organizations have custom in house Applications. These take ample time to develop and the sophistication needed to develop a Proof-Of-Concept is enormous! “With prooV’s Pilot-as-a-Service platform you can discover/showcase solutions and easily run multiple PoCs at once, on secure cloud-based testing environments” True to it’s […]
Over the last two months Ransomware infections have held not only home users hostage but many high-profile targets like hospitals, churches, schools and even courthouses. Is the shame on reporting such incidents disappearing? Earlier this month, a Ransomware infection paralyzed the Hollywood Presbyterian Medical Center in Los Angeles. Patients were diverted to other hospitals as the infection […]
The Air Force just announced that they added 10 companies to a 5 year cyber security project. The service’s Cyber Security and Information Systems Technical Area Tasks program is a multiple-award, indefinite-delivery/indefinite-quantity contract that runs through Nov. 30, 2020 and will cover research and development, and test and evaluation efforts in areas including software analysis, […]
While I love the tool RUFUS for all my bootable media needs; This Microsoft tool makes installing and/or upgrading to Windows 10 incredibly simple. The Windows 10 Media Creation Toolkit is back at https://www.microsoft.com/en-us/software-download/windows10 and social media indicates the upgrade is once again available via Windows Update. It would seem that all is right again since a few November […]
Here at are ISRATECHNOLOGIES we ask, as technology moving ahead in a rapid rate. Are we human ready for it? ISRATECHNOLOGIES believe that even human will be obsolete and some of us will stay behind since they will not be able to grasp all the new technologies, especially the last old generation. SKULLY AR-1 is […]
An advanced, distributed real-time IP networking platform known as ‘Orion’ is introducing advanced communications and audio management capabilities on board aircraft, facilitating advanced directional audio and voice command that become essential for modern fighters, flown ‘heads out’ using of helmet-displays. With the growing demand for data connectivity and limitations of current airborne network solutions, the […]
Sex toys companies offering Remote controlled two ways to play via your iPhone or Android smartphone. Set it up in minutes and turn your smartphone into a wireless remote control. Play by yourself or hand off your mobile phone to your partner and watch their excitement as you been pleasured across the room they even […]
BitLocker is a full-disk encryption system added to Windows in 2007, with the release of Vista. This feature allows both home users and enterprises to protect their data by means of powerful encryption, but without having to constantly enter a password on boot up. BitLocker can be fooled into granting attackers access to the data, […]
According to many reports from British newspapers, for the first time the UK Parliament’s internal computer network AKA the Parliamentary Digital Service (PDS) was infected by ransomware. The hack is the first report of a successful breach on the secure parliament network, used internally by government employees. Some quickly blamed the cyber-attack on advanced persistence threats (APTs), but […]
The University of Texas at Austin’s Radionavigation Laboratory demonstrated hacking a civilian drone, forcing it to change course by sending fake GPS signals, and then, as if some phantom has given the drone a self-destruct order, it hurtles toward the ground. At the last second, the drone was spared but Professor Todd Humphreys and his […]
IsraTechnologies just launched a new website, KobybenHair.com. IsraTechnologies is an advanced IT firm that caters to law firms, financial services organizations, medical offices and other corporate entities’ technology needs. IsraTech provides enterprise level IT support & solutions with an emphasis on cyber security and customer service. Catering to small to medium size business’ at incomparable price points […]
According to a Blog post by Promisec, current endpoint protection and detection solutions lag behind today’s security threats. This based on a Survey by Promisec, a security and compliance solution provider. An alarming 89% of VP and C-Level IT Leaders have a heightened fear of a breach over the next year Only 32% of Respondents Have Advanced Endpoint […]
Tor launches serious allegations against the FBI and CMU. Tor accuses the two of privately joining forces to find a way to hack the Tor network and deanonymize it’s users. The project’s blog claims the FBI paid $1 million for research that would allow them to unmask Tor users. This research was done at Carnegie Mellon […]
Between 2007 and 2014 12 International Companies including 9 Financial Institutions were hacked. Three men were arrested and US Prosecutors have finally brought official charges. The three, Gery Shalon, Joshua Samuel Aaron and Ziv Orenstein, are now facing 23 charges of conspiring to commit money laundering, identity theft, computer hacking and illegal Internet gambling. The […]
November 24, 2013 The Raytheon Co. Missile Systems segment in Tucson, Ariz., will build the latest versions of a radio-controlled anti thank missile that has been in the U.S. inventory since 1970 under terms of a multi-million-dollar contract announced late last week. Officials of the U.S. Army Contracting Command, Redstone Arsenal (Missile), Ala., on Thursday […]