Cyber

Cyber

smart phone. image by pixabay

How come your phone knows exactly what to recommend you? How come you have just received an as for that thing you just talked...
security. image by pixabay

With the world of security constantly changing and hackers adapting to those changes, nothing is perfect in terms of security. While two-factor authentication is...
Cyber security and City Lights. image by pixabay

A game-changing cybersecurity technology is bringing about a new era, claims the US Army Combat Capabilities Development Command (DEVCOM). US Army researchers are creating...
Ukraine tank. image by pixabay

The latest turn around in the Ukrainian Russian war shows new territories being reclaimed by Ukrainian soldiers. This turn of events can be partially...
Virtual Reality. image by pixabay

Voice command features on virtual reality headsets could lead to major privacy leakages, known as “eavesdropping attacks.” Built-in motion sensors within common VR headsets...
cyber security. image by pixabay

Ransomware and malware, as well as cyberattacks, are a real threat to the systems of governments and local authorities, and the number of warnings...
smart city. image by pixabay

As part of tomorrow's city planning, smart cities will utilize both information and communication technologies as well as Internet of Things (IoT) solutions in...
Bio Hazard. image by pixabay

Following several biohazard epidemics, the COVID-19 pandemic and the 2001 anthrax attacks in the US, a critical infrastructure biodefense program will be established at...
IoT chip. image by pixabay

Internet-of-things devices are vulnerable to various cyber threats. Recent reports suggest that one of those supposed attacks is the side-channel attack. This tactic seeks...
computer system. image by pixabay

Computers or networks in critical infrastructures are often physically isolated to prevent external access. “Air-gapping” means that these systems have neither wired nor wireless...
cyber attack. image by pixabay

Ransomware is malicious software that encrypts a computer system’s data and demands payment to restore access. To help organizations protect against ransomware attacks and...
Security. image by pixabay

By 2025, cyber attackers will have weaponized operational technology (OT) environments to successfully harm or kill humans, Gartner research firm predicts. OT is a...
cyber security. image by pixabay

In today's society, emerging technology is all around us. Our lives are impacted by technology in every way, from artificial intelligence to smart devices....
combat warships. image by pixabay

The threats facing the US are evolving rapidly and the technologies available to warfighters around the world are advancing faster than ever while much...
metaverse. image by pixabay

Through virtual reality headsets or augmented reality glasses, people will be able to live their whole lives in environments where the boundaries between the...
cyber security. image by pixabay

Modern network cryptographic key technologies will be critical to the US Army’s effort of protecting tactical network communications from the prying eyes of potential...
astronaut. image by pixabay

The US Space Force is using virtual reality headsets to launch satellite mission operators into places they’ve never been before. The platform allows the...
cyber. image by pixabay

Deepfakes, an AI-based technology to create false content, have become easier than ever to make. The FBI suspects Russian and Chinese actors are using...
Security. image by pixabay

The source code of a dangerous malware sample targeting millions of routers and Internet of Things (IoT) devices has been uploaded to GitHub. Other...
image by pixabay

Call for Innovation:  Following the immense success of the previous two cycles and their integration into the defense sector, iHLS invites you to join the...
image by pixabay

Bypassing complex encryption has become a main goal and pursuit to State-actors and cybercriminals alike. It has never been more important to focus on...
image by pixabay

A new wireless AI blockchain technology is going to change the way airports manage security checks. Smart security trays will connect with passengers without...