image provided by pixabay

Dual-Use Startup Open Call

0
INNOFENSE Call for startups – Dual Use Technologies: Following the immense success of the previous four cycles and their integration into the defense sector, iHLS...
image provided by pixabay

Data Breaches – The New Normal?

0
Despite advancements in technology and increased awareness of cybersecurity threats, companies continue to fall victim to breach attacks. Just this year has seen a...
images provided by pixabay

Severe Ransomware Attack on London Hospitals

0
Several major hospitals in London were victims of an ongoing cyberattack on a third-party lab provider, forcing them to send patients away and cancel...
image provided by pixabay

World’s First Wooden Satellite to Reach Space

0
Kyoto University announced that the first wooden satellite in history is going to travel to space in September on a SpaceX rocket. The LignoSat...
image provided by pixabay

Charting Space Junk Constellations in Earth’s Orbit

0
A new initiative is charting “star constellations” in the Earth’s orbit, but not ones made of actual stars – these constellations are charted patterns...
image provided by pixabay

How Can We Tackle 160 Million Pieces of Space Debris?

0
Experts claim there are over 160 million pieces of space debris currently orbiting Earth, which could be extremely dangerous and cause a cascading chain...
image provided by pixabay

Israel’s New ‘Cyber Dome’ Against Iranian Cyberattacks

0
Israel's Iron Dome defense system famously defends it from incoming aerial attacks, and now it is getting a “cyber counterpart” to defend against online...
image provided by pixabay

AI Could Be Poisoned in Wartime, and the Pentagon Is Worried

0
Armies worldwide are beginning to use more and more AI-based modules, which raises the risk of adversaries poisoning those modules and sabotaging the algorithms,...
image provided by pixabay

Cybersecurity Report Shows Record Number of Cyberattacks in 2024

0
New report by cybersecurity company Check Point reveals that the first quarter of 2024 showed a significant increase in cyberattacks, with the most heavily...
images provided by pixabay

Crypto Scammers Upload Fake Apps to Google Play, Sued by Google

0
Google has filed a lawsuit against a group of crypto scammers for defrauding over 100,000 people worldwide by uploading fraudulent investment and crypto exchange...
images provided by pixabay

Experts Warn Cybersecurity Attacks Can Cripple Healthcare

0
The healthcare industry needs to wake up and focus on securing its infrastructure. We have reported on many cyberattacks on various health infrastructures, hospitals, and...
image provided by pixabay

Iran Supplies the Houthis With Hypersonic Missiles

0
This news was initially reported by the Russian state-run RIA Novosti news agency, just weeks after Houthi rebels hinted at the “surprises” they have for the...
image provided by pixabay

Microsoft’s New AI Hacker Tracker

0
Microsoft set to release Copilot for Security AI tool to help cybersecurity workers produce summaries of suspicious incidents and identify hackers’ methods to conceal...
image provided by Alumor

Alumor – Clean, Available Water Wherever You Need It

0
Alumor is a graduate of the INNOFENSE Innovation Center operated by iHLS in collaboration with IMoD. For life to occur, it needs safe drinking water,...
image provided by pixabay

Underwater Data Cables Cut Following Houthi Threat

0
It is speculated that Yemen’s Houthi rebels cut three cables under the Red Sea that provide global internet and telecommunications, though it is still...
images provided by pixabay

China Plans CCTV Moon Surveillance System

0
China is planning to develop a Moon surveillance system to protect its Lunar assets, which will reportedly have millions of sensors and cameras for...
image provided by pixabay

Historic Mission Launched to Monitor Space Junk

0
This historic mission to inspect and monitor a large piece of space junk was launched by Rocket Lab and Astroscale Japan atop an Electron...
Hardware. image by pixabay

Experts Claim AI Safety is Rooted in Hardware, Not Software

0
A major new report calls for the regulation of the hardware that underpins all AI ("compute") to help prevent artificial intelligence misuse and disasters. Several...
image provided by pixabay

Monitoring Online Terror with AI

0
Social media platforms on the internet are constantly flooded with huge amounts of content, and this vast ocean of material needs to be constantly...
image provided by pixabay

The Houthis Threaten to Sever Undersea Cables, Cause Worldwide Internet Shortage

0
Yemen’s Iran-backed Houthis have been continuously attacking ships off the coast of Yemen since the beginning of Israel’s war with Hamas, claiming they will...
image provided by pixabay

Cybersecurity in the Workplace

0
Charles Harry is a former National Security Agency cyberwarfare expert and director of the University of Maryland's Center for Governance of Technology and Systems,...
image provided by pixabay

Eliminating Space Debris with Ground-Based Lasers

0
Australia's EOS Space and Japan's EX-Fusion combat space debris with a laser system, which could be a crucial fix for the increasingly crowded Earth...

Latest

Yasha Iravantchi looks like an anonymous stick figure in this monitor connected to PrivacyLens. Credit: Brenda Ahearn, Michigan Engineering.

The Smart Camera Sees You as a Stick Figure and Protects...

0
PrivacyLens is a new camera that prevents companies from collecting identifiable photos and videos from smart devices. Today’s world is filled with smart devices that...