Cyber

Cyber

Biometrics

Things like lightning fast DNA processing, biometrics recognition based on iris scans, thumbprint or voice patterns and video face recognition from vast distances seemed...
Olympics

The Winter Olympics will take place in South Korea during February, and the country is planning to deploy 10,000 police officers in and around...
military cloud computing

milCloud is a cloud-services product portfolio, managed by the US Defense Information Systems Agency (DISA) that features an integrated suite of capabilities designed to...
mobile app

Mobile apps often serve for monitoring and managing machines, and even entire industrial processes. However, the combination of apps and industrial control systems makes...
smart home

The message heard at the CES 2018 technology exhibition said smart speakers have become available for everyone and are part of daily life. However,...
defense data

Researchers evaluate that 99%-plus of the data that the US DoD collects is dark and was never exploited. Artificial intelligence powered by cloud computing...
device encryption

The FBI had been unable to access data from 7,775 devices in fiscal year 2017, a growing figure causing setbacks in cases from terrorism...
security flaws

Hackers now have a growing number of avenues by which to access personal information, and securing that information will only become more and more...
cyber capabilities

The recent protests in Iran and the regime’s attempts to block them shed light also on Tehran’s cyber capabilities. Offensive cyber operations have become...
big data

The IDF has been dealing daily with missions involving the extraction of information and insights from large masses of data collected by its vast...
satellite-drone communications

A new beam-switching technology was recently tested proving data transfer and anti-jamming measures between satellites and drones are more successful when two beams are...
cybersecurity

Blockchain technology has recently caught the world's attention because of the central role it plays in enabling cryptocurrencies. It enables secure information transmission on...
defense industries

The Israeli defense industries have been actively participating in the Make in India initiative launched in 2014 and in other initiatives many years before....

The U.S Navy is about to equip it’s Littoral Combat Ship (a class of relatively small surface vessels intended for operations close to shore)...
cyberattacks

What were the major trends in the global cyberspace during 2017? According to a report by Clear Sky Cyber Security, the main attacks were...
smartphone password security

New study from Nanyang Technological University, Singapore (NTU Singapore) has found a new security breach that hackers could use to guess your phone's PIN...
big data

Big data technologies enable us to identify patterns, trends and new details by automatically screening huge amounts of data. In the intelligence, security and...
iot

As we approach the end of 2017, we begin to ponder what will 2018 look like, technologically speaking. One of the hottest trends today...
terrorist groups

As the bitcoin concept gains more and more supporters around the globe, there are concerns that this digital currency considered a highly secure method...
big data

Gathering insights from big data regarding future trends requires data scientists’ expertise and can take weeks or even months. Now, an MIT spinout has...
iot 2017 conference

The IoT 2017 Conference and Exhibition held today at the Lago Conference Center have attracted all the leading figures in the IoT sector, technology,...
3d printing

The US Armed Forces have been using 3D printing technologies more and more often. They have been manufacturing 3D printed grenade launchers called RAMBO,...