Lack Of Nuclear Power Plant Security Measures Pose Risks

0
A study of the information security measures at civilian nuclear energy facilities around the world found a wide range of problems at many facilities...

Call For Proposals For Startups In Defense and HLS Fields

0
  iHLS, the global media leader in security technology, is inviting entrepreneurships in this field to join the second cycle of the world first accelerator...

Secure Biometric Technology For Paying The Register

0
Biometric identification means have been around for some time now, helping commercial companies to keep their information secure and their offices compartmentalized. Being an...
Image by Unsplash

Cybercriminals Use Fake Google Ads to Steal User Credentials

0
Cybercriminals have been running a sophisticated phishing campaign using fake Google Ads to steal user credentials, researchers from Malwarebytes Labs have uncovered. These malicious...
security. image provided by pixabay

AI And Security – Higher Level Of Safety

0
As new technologies and capabilities have emerged in recent years, artificial intelligence and security have become intertwined, leading to a high level of safety. Artificial...

Israeli CTERA to Provide Private Cloud System to US MoD

0
Israeli startup firm CTERA Networks has won a tender to provide a private cloud system for file sharing to the US Ministry of Defense....
Drone Pilots

Watch: New Sensor Will Detect Drone Pilots

0
A new sensor called RF-300 was released by Dedrone, that automatically locates drones and their pilots. The current ubiquity of drones makes for a very...

Heartbeat Based Biometric Identification

0
Canadian company Nymi has managed to develop a unique, first of its kind, technological solution: Paying with a wrist-bracelet that can detect the heartbeat...

The New Cryptography: Carbon Nanotubes

0
Carbon nanotubes - is there anything they can’t do? They’re strong, hard, loaded with unique electrical, thermal, and optical properties, and have been heralded...

US Air Force Loses Investigation Database

0
We have recently written about the mind staggering fact that the Pentagon still uses floppy disks to perform nuclear missions. This new story is...

Day After Cyber Agreement: China Attacks

0
Last month President Barack Obama said that the U.S. would be “watching closely” to see if “words are followed by actions” after he and...
Security. image by pixabay

Why Do Cyber Criminals Target OT Systems?

0
By 2025, cyber attackers will have weaponized operational technology (OT) environments to successfully harm or kill humans, Gartner research firm predicts. OT is a...
image provided by pixabay

The New AI-Based, Open-Source Solution to Combat Evasive Cyberattacks

0
As cyberattacks continue to rise globally, traditional security systems are struggling to keep up with increasingly sophisticated methods used by attackers. To counteract this,...
Image provided by pixabay

Companies Are Not Ready To Face Cyber Threats

0
Organizations have shifted from a largely static operating model, where people operated from single devices from one location, connecting to a static network, to...

Financial Cyber Attacks on the Rise

0
SWIFT, the global financial messaging system, announced that a few of it's member banks have been attacked by hackers. SWIFT pressured them to comply...

Can Israel keep its position as top UAS exporter ?

0
The UAV market is changing rapidly - on one, hand the demand grows, but at the same time, the "rules" are changing. Unmanned air systems...
image provided by Emotion Logic

The Truth Behind the Mask – the Revolutionary Algorithm that Recognizes...

0
Many industries nowadays want the ability to take the audio of a conversation and know the true feelings and hidden intentions of the speaker,...
image provided by pixabay

Decentralized Storage – A Solution to Cloud-Based Attacks

0
Nowadays, turning to cloud-based providers for data storage is a common practice of businesses. It offers a convenient and affordable solution, cutting costs of...

N Korea (Probably) Behind Cyber Attacks On SKAF

0
North Korea is likely behind another cyber attack on South Korea’s digital infrastructure, United Press International reports. South Korea’s Air Force’s website has been...

Could DARPA Have Invented The Ultimate Cyber Security?

0
When the internet first started coming into being, security wasn’t really an issue, not even as an afterthought. This is was more than half...

The Browser Add-On to Protect Your Devices From Malware

0
  In the old days of the home computing, malware - viruses, computer worms, and trojan horses - ranged from the relatively harmless prank to...

Communicating under water – a revolutionary Israeli development

0
Dolphins communicate under water using sound waves that travel great distances. Now, human beings can also communicate under water, using a small device, attached...

Latest

3D-Printed Antennas Bend Without Breaking the Signal

0
A new type of 3D-printed antenna could transform how vehicles, drones, and wearable devices maintain wireless communication while in motion. Developed by researchers at...