Malware

Expert: Preparation for Hezbollah pager explosions likely took months

This type of operation is familiar in intelligence circles and requires significant cooperation from organizations involved in the manufacturing process.

(Illustrative) A pager device and a crowd in Lebanon near a site where Hezbollah members' pager devices were attacked.
Cyberattack (illustrative)

BiBi attacks Israel: Pro-Hamas hackers use new malware to attack Israeli companies

Cyber Attack, illustration.

Cyber criminals hack Internet users with advertising tools - HP

 A router providing internet access.

Chinese hackers could be a threat to your home internet router


FBI says it has sabotaged hacking tool created by elite Russian spies

The official identified the FSB hackers behind the malware with a notorious hacking group known as "Turla."

 Cyberattack on a smartphone. Beware of downloading spyware (Illustrative).

Rothman: Open gov't inquiry into 'NSO scandal' police wiretapping

Gottlieb said, "No one can pass the audit on themselves, and we should think about examining things with a governmental or state investigative committee."

 SIMCHA ROTHMAN, chairman of the Knesset Constitution, Law and Justice Committee, was said to have ‘ruffled a few feathers’ when he addressed the Jewish Federations of North America last week.

Iranian hackers targeted Israelis using rare cyberattack techniques

The new malware allows hackers to steal data from Telegram and take screenshots and record sound.

Iranian flag and cyber code [Illustrative]

Cybercriminals find new ways to seem legitimate: How can we spot them? - McAfee

Technology has become more advanced, and scammers have clocked on and are taking full advantage. McAfee's report explained how to spot the scams.

 The McAfee logo is displayed at the Mobile World Congress (MWC) in Barcelona on February 25, 2019.

Lenovo laptops vulnerable to dangerous malware, Israeli company finds

Over 100 models of Lenovo computers were found to be vulnerable to harmful malware by an Israeli cybersecurity company.

 A Lenovo laptop computer is displayed with the Microsoft Windows 7 operating system at a computer store in Hong Kong November 5, 2009

NSO's Pegasus: How to know you're being tracked - and how to stop it

Do you think your phone is being targeted? These signs could help determine if you've been hacked and what you can do about it.

 Social media: Instagram, Twitter, Facebook, LinkedIn, TikTok

Microsoft detects malware in systems belonging to Ukraine gov't

The victims of the malware include Ukrainian government agencies that provide critical executive branch or emergency response functions, Microsoft said.

 View of the Microsoft offices in Herzliya, Israel, on May 28, 2021

Cyber attacks on hospitals can kill - here's why

In Israel specifically, any one hospital being unable to conduct MRI and CT scans, which run 24/7 and are backlogged, could impact the country nationwide. 

Projection of cyber code on hooded man (llustrative)

Prestigious EU journalism prize awarded to Israeli malware investigation

The 'Pegasus Project' investigation concluded that people across 50 countries had been targeted for potential surveillance.

SECURITY SURVEILLANCE monitors. Privacy advocates argue that even if the official transfer of data does not identify individuals, anyone who wants to abuse the information to invade an individual’s privacy can do so with ease

Massive data leak uncovers human rights abuses using Israeli tech - report

The leak contains a list of over 50,000 phone numbers that the report estimated were identified as “people of interest” by clients of Israeli spyware company NSO Group since 2016.

SECURITY SURVEILLANCE monitors. Privacy advocates argue that even if the official transfer of data does not identify individuals, anyone who wants to abuse the information to invade an individual’s privacy can do so with ease

Israeli spyware allegedly used in Al Jazeera hack

Apparently dozens of workers at Al Jazeera, the Qatari state-owned media company, have been the target of a cyberattack likely linked to the governments of Saudi Arabia and the United Arab Emirates.

Cyber Hackers