Cyber Security

Cyber Security

ai-based malware

Artificial intelligence could pose both opportunities and challenges as reported by the Center for a New American Security (CNAS), one of America’s top defense...

With the advent of technologies such as artificial intelligence, robotics, quantum computing, the Internet of Things, augmented reality, materials science, 3-D printing, and data...
unmanned systems

We are delighted to invite ground-breaking startups in the unmanned systems and robotics fields to take part in the sixth unmanned vehicles & robotics...

Cyberattacks and the methods by which the public and private sectors deter and counter them have occupied the headlines with increasing frequency in today’s...

The "smart city" sounds like a digital utopia, a place where data eliminates first-world hassles, dangers and injustices. But there are some problems with...

Militaries across the world should urgently work to avoid the "unanticipated interaction" between individual AI systems, an electronic rights organisation has warned. Targeted at the...
VPN

VPN ,or virtual private network, is a term we hear more and more. This is understandable if you take into consideration the many varied...
fax

A ground-breaking research dubbed Faxploit, conducted by CheckPoint, unfolds the shocking dangers of the seemingly simple and technologically innocent fax machine. The daunting news...

Major data breaches are a near-daily occurrence. Cyberthieves have been obtaining billions of passwords and other sensitive personal information. Behavioral biometrics is a new...

The proliferation of IoT technology has resulted in hundreds of thousands of connected systems being embedded in many a city’s critical infrastructures, enabling city...

The satellite communications that ships, planes and the military use to connect to the internet are vulnerable to hackers that, in the worst-case scenario,...
ea

Mobile devices contain access to all of our personal and corporate data. Eavesdropping is a prevailing threat among many on mobile phones, with technology...
fitness watches

Are fitness applications the new threat to military officers and Pentagon officials? A recent memo from Deputy Defense Secretary, Patrick Shanahan, states the dangers of...

The Israel Airports Authority has recently established a special Cyber defense center in Ben-Gurion international airport. The decision to establish the dedicated center was made...

The near-future battlefield will be characterized by the presence of Internet of Things: smart devices, soldier-worn sensors and unmanned aircraft will produce a nonstop...
unmanned systems

If you are part of the global and Israeli unmanned systems and robotics ecosystem, you cannot afford to miss the leading annual event in...

Cyber attacks against IoT devices can cause considerable damages. The US Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has signed a...

Cyberattacks have become a potent threat to US organizations and infrastructure. There is also a renewed concern over the possibility of Russian-sponsored meddling in...
gps jamming

$100B worth of damages is created by cargo theft every year, of which a major part involves using GPS jammers bought online for $20....
cyber technology

Information security and safety in Vietnam has been recently improved, however, potential risks remain, especially for small and medium-sized enterprises. Around 27% of recent...

Ransomware cyber attacks are intensifying in scale and sophistication, and the perpetrators are better at evading countermeasures. A recent NTT Security survey revealed that...
unmanned

If you are part of the global and Israeli unmanned systems and robotics ecosystem, you cannot afford to miss the leading annual event in...