Related topics: cells

Israeli defence computer hit in cyber attack

Hackers attacked Israeli computers including one used by the defence ministry department dealing with civilians in the occupied West Bank, an Israeli data protection expert said on Monday.

Israeli tunnel hit by cyber attack, experts say (Update)

When Israel's military chief delivered a high-profile speech this month outlining the greatest threats his country might face in the future, he listed computer sabotage as a top concern, warning a sophisticated cyberattack ...

Georgia Tech uncovers iOS security weaknesses

Researchers from the Georgia Tech Information Security Center (GTISC) have discovered two security weaknesses that permit installation of malware onto Apple mobile devices using seemingly innocuous applications and peripherals, ...

New system to combat online banking fraud

A security solution which protects against the most serious threat to online banking customers, responsible for millions in annual losses, is being rolled out across Europe by a Cambridge University spin-out.

Deals and ordeals for Chinese tech giant Huawei

Chinese telecom giant Huawei is perplexed at its treatment in the West, with the United States fearful it is a Trojan horse for cyber warfare even as Europe eagerly courts its business.

Australian super-trawler ban in doubt

Australia's hopes of blocking a controversial super-trawler from fishing in its waters looked uncertain with the opposition speaking out against the move and a key independent lawmaker expressing reservations.

'Trojan horse' effect may explain jellyfish blooms

(Phys.org)—Man-made structures such as harbours, tourist facilities, oil rigs and aquaculture farms provide ideal sanctuaries for jellyfish polyps to flourish and may explain an apparent increase in jellyfish blooms in ...

page 4 from 7