Comsec Blog on Information Security

Sunday, April 7, 2013

The international computer hackers group- Anonymous, threatened to "erase Israel from the Internet" in a massive coordinated attack that occurred on 07.04.2013

However, in reality, only minimal damage was caused and by mid-morning Sunday the attack Being the leading company for the information security in Israel, our experts were interviewed in the news. Take a look at Defense Magazine
http://www.ynet.co.il/articles/0,7340,L-4363687,00.html
http://www.ynet.co.il/articles/0,7340,L-4363925,00.html
http://www.ynet.co.il/articles/0,7340,L-4364679,00.html
http://www.pc.co.il/?p=114547
http://www.pc.co.il/?p=114672
http://www.haaretz.co.il/captain/net/1.1985084
http://www.haaretz.co.il/captain/net/1.1986543
http://www.haaretz.co.il/captain/net/1.1984288
http://seci.co.il/2013/04/%d7%94%d7%94%d7%90%d7%a7%d7%a8%d7%99%d7%9d-%d7%a2%d7%95%d7%a9%d7%99%d7%9d-%d7%97%d7%99%d7%9e%d7%95%d7%9d-%d7%91%d7%a4%d7%99%d7%99%d7%a1%d7%91%d7%95%d7%a7-%d7%9c%d7%a7%d7%a8%d7%90%d7%aa-%d7%94-7-4/
http://www.mako.co.il/nexter-internet/security/Article-62f8a2b9d61ed31006.htm
http://net.nana10.co.il/Article/?ArticleID=969124
http://www.holesinthenet.co.il/archives/86978
http://www.the7eye.org.il/58114
http://room404.net/?p=59737

Enat Malca
Marketing Manager
enatm@comsecglobal.com |  www.comsecglobal.com
Posted by Revitall at 1:57 PM
Newer Posts Older Posts Home
Subscribe to: Posts (Atom)

Comsec Group Blog

Comsec Group, founded in 1987, is a pioneering market leader, providing all-inclusive Cyber and Information Security services to clients around the globe. Our mission is to serve our clients as trusted advisors, by securing their information and operational assets, ensuring the achievement of their business goals.

Share This

Tweet

Contributors

  • Comsec Group
  • Josh Grossman
  • Revitall
  • Stribog
  • Unknown
  • rbg

Search This Blog

Blog Archive

  • ►  2018 (9)
    • ►  November (1)
    • ►  October (2)
    • ►  September (2)
    • ►  August (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2017 (44)
    • ►  November (3)
    • ►  September (2)
    • ►  August (1)
    • ►  July (4)
    • ►  June (4)
    • ►  May (3)
    • ►  April (8)
    • ►  March (9)
    • ►  February (5)
    • ►  January (5)
  • ►  2016 (9)
    • ►  December (4)
    • ►  November (2)
    • ►  October (1)
    • ►  August (1)
    • ►  February (1)
  • ►  2015 (3)
    • ►  September (1)
    • ►  August (1)
    • ►  July (1)
  • ►  2014 (4)
    • ►  December (1)
    • ►  February (3)
  • ▼  2013 (22)
    • ►  December (1)
    • ►  October (3)
    • ►  September (4)
    • ►  August (3)
    • ►  July (2)
    • ►  June (5)
    • ►  May (3)
    • ▼  April (1)
      • The international computer hackers group- Anonymou...
  • ►  2012 (27)
    • ►  December (1)
    • ►  November (1)
    • ►  October (2)
    • ►  September (2)
    • ►  August (2)
    • ►  June (5)
    • ►  May (1)
    • ►  April (2)
    • ►  March (1)
    • ►  February (2)
    • ►  January (8)
  • ►  2011 (22)
    • ►  December (5)
    • ►  November (8)
    • ►  October (3)
    • ►  September (1)
    • ►  August (2)
    • ►  July (2)
    • ►  February (1)
  • ►  2010 (23)
    • ►  November (2)
    • ►  September (1)
    • ►  August (1)
    • ►  July (2)
    • ►  June (6)
    • ►  May (1)
    • ►  April (2)
    • ►  March (2)
    • ►  February (1)
    • ►  January (5)

Labels

Adobe Acrobat (1) application (1) Application Security (7) authentification (1) Banking (1) biometrics (1) Cloud Computing (2) Cloud Security (2) Codefend (2) ComTech (2) Cost Management (1) Crimeware (1) Cybercrime (3) CyberUpdates (30) Data Leakage Prevention (DLP) (2) Data Protection (2) Data Security (3) distruption (1) Embezzlement (1) Employment Opportunities (1) ERP Security (1) FIFA (1) Finance (2) Fraud (2) Fraud Detection and Prevention (1) Google (1) GRC (6) Hackers (3) Hydraq (1) Information Protection and Control (IPC) (2) Information Security (3) InfoSec 2010 (1) Internal Auditors (1) Internet Explorer (2) israel (1) IT Costs (1) IT Security (2) Jobs (1) Josh Grossman (13) Live Stream (1) Malware (3) Mobile Phones (2) News (1) Organised Crime (2) OWASP (1) OWASP Top Ten (2) PA-DSS (2) PCI (3) PCI Compliance (3) PCI DSS (3) PCI:DSS (2) Product Focus (1) SAP Security (2) scanning (1) Secure Software Development Lifecycle (3) Security Code Analysis (1) Security Code Review (2) Security Threats (7) Social Networking (3) Software Security (2) Stuxnet (1) Trojan Horse (1) Virus (1) Vulnerabilities (2) Web 2.0 (1) Web Security (1) World Cup (1) Zero Day Attack (3)
Awesome Inc. theme. Powered by Blogger.