The UK National Cyber Security Centre has issued a fresh alert about increasing attempts to steal information from specific groups and individuals, according to...
Recent data has showed an undeniable rise in DDoS (distributed denial of service) attacks. According to new NETSCOUT research, there is a significant link...
It has been reported that the Israeli Technion university has fallen victim to a cyber attacked conducted by the ransomware groups DarkBit. An email...
The US Department of Defense releases its National Defense Strategy (NDS) every four years, in which it summarizes the key strategic principles that will...
According to recent reports, a team of researchers from the university of British Columbia, USA, are currently investigating a new method to monitor underground...
As terrorism runs rampant and natural disasters call for innovative emergency responses, experts in the field reflect on what's next to come and this...
The advent of facial recognition technology carried with it the promise of great benefits, especially for law enforcement who use facial recognition to detect...
When conducting law enforcement investigations, speed is of the essence. The difference between detecting criminal activity in the digital space in seconds versus hours...
The use of live facial recognition (LFR) both in law enforcement and for other purposes is regulated, albeit controversial. Facial recognition technology clearly involves...
New research may have vital applications in areas such as human-intelligence analytics. Traditionally, emotion detection has relied on the assessment of visible signals such...
Fire departments conducting “size up” training typically rely on whiteboard discussions, drives around neighborhoods and photo-based systems. New training technology will help firefighters train...
Sensors can provide huge amounts of information about an environment. Video from unmanned aerial vehicles (UAVs) and social media posts could provide valuable information...
The Federal Bureau of Investigation (FBI) has run over 390,000 facial recognition searches since 2011. The Department of Homeland Security has also said it...
A new smart glass development will contribute to various commercial and security applications, ranging from imaging to advanced robotics. Photodetectors, also known as photosensors,...
The fight against terrorism continues, and this time india is leading the charge.
A master database of 21 databases will provide real-time information against terror...
The Tactical Humanitarian Operations Response vehicle (THOR) was built to operate under any network in any environment, from dense forests during wildfires to remote...
According to reports, only 1% of defense firms in the US utilize Department of Defense's security services. Why is that?
Although US companies must adhere...
The Internet of Things, or IoT, is made up of interconnected sensors and devices networked with computers. Alongside consumer devices like smartwatches etc, many...
The electromagnetic (EM) spectrum is used by a wide variety of systems, commonly referred to as "spectrum dependent systems" (SDSs). Each SDS may transmit...