Lack Of Nuclear Power Plant Security Measures Pose Risks
A study of the information security measures at civilian nuclear energy facilities around the world found a wide range of problems at many facilities...
Call For Proposals For Startups In Defense and HLS Fields
iHLS, the global media leader in security technology, is inviting entrepreneurships in this field to join the second cycle of the world first accelerator...
Secure Biometric Technology For Paying The Register
Biometric identification means have been around for some time now, helping commercial companies to keep their information secure and their offices compartmentalized. Being an...
Cybercriminals Use Fake Google Ads to Steal User Credentials
Cybercriminals have been running a sophisticated phishing campaign using fake Google Ads to steal user credentials, researchers from Malwarebytes Labs have uncovered. These malicious...
AI And Security – Higher Level Of Safety
As new technologies and capabilities have emerged in recent years, artificial intelligence and security have become intertwined, leading to a high level of safety.
Artificial...
Israeli CTERA to Provide Private Cloud System to US MoD
Israeli startup firm CTERA Networks has won a tender to provide a private cloud system for file sharing to the US Ministry of Defense....
Watch: New Sensor Will Detect Drone Pilots
A new sensor called RF-300 was released by Dedrone, that automatically locates drones and their pilots.
The current ubiquity of drones makes for a very...
Heartbeat Based Biometric Identification
Canadian company Nymi has managed to develop a unique, first of its kind, technological solution: Paying with a wrist-bracelet that can detect the heartbeat...
The New Cryptography: Carbon Nanotubes
Carbon nanotubes - is there anything they can’t do? They’re strong, hard, loaded with unique electrical, thermal, and optical properties, and have been heralded...
US Air Force Loses Investigation Database
We have recently written about the mind staggering fact that the Pentagon still uses floppy disks to perform nuclear missions. This new story is...
Day After Cyber Agreement: China Attacks
Last month President Barack Obama said that the U.S. would be “watching closely” to see if “words are followed by actions” after he and...
Why Do Cyber Criminals Target OT Systems?
By 2025, cyber attackers will have weaponized operational technology (OT) environments to successfully harm or kill humans, Gartner research firm predicts. OT is a...
The New AI-Based, Open-Source Solution to Combat Evasive Cyberattacks
As cyberattacks continue to rise globally, traditional security systems are struggling to keep up with increasingly sophisticated methods used by attackers. To counteract this,...
Companies Are Not Ready To Face Cyber Threats
Organizations have shifted from a largely static operating model, where people operated from single devices from one location, connecting to a static network, to...
Financial Cyber Attacks on the Rise
SWIFT, the global financial messaging system, announced that a few of it's member banks have been attacked by hackers. SWIFT pressured them to comply...
Can Israel keep its position as top UAS exporter ?
The UAV market is changing rapidly - on one, hand the demand grows, but at the same time, the "rules" are changing.
Unmanned air systems...
The Truth Behind the Mask – the Revolutionary Algorithm that Recognizes...
Many industries nowadays want the ability to take the audio of a conversation and know the true feelings and hidden intentions of the speaker,...
Decentralized Storage – A Solution to Cloud-Based Attacks
Nowadays, turning to cloud-based providers for data storage is a common practice of businesses. It offers a convenient and affordable solution, cutting costs of...
N Korea (Probably) Behind Cyber Attacks On SKAF
North Korea is likely behind another cyber attack on South Korea’s digital infrastructure, United Press International reports.
South Korea’s Air Force’s website has been...
Could DARPA Have Invented The Ultimate Cyber Security?
When the internet first started coming into being, security wasn’t really an issue, not even as an afterthought. This is was more than half...
The Browser Add-On to Protect Your Devices From Malware
In the old days of the home computing, malware - viruses, computer worms, and trojan horses - ranged from the relatively harmless prank to...
Communicating under water – a revolutionary Israeli development
Dolphins communicate under water using sound waves that travel great distances. Now, human beings can also communicate under water, using a small device, attached...

















































