image provided by pixabay

North Korean Hacker Group Embeds Malware in Developer Tools

0
North Korea's notorious Lazarus Group, known for high-profile cryptocurrency thefts, has evolved its cyberattack strategy to target software supply chains. Security experts have uncovered...
USB. image provided by pixabay

Massive Crypto Mining Cyber Campaign Spreads via USB Drives

0
A new and persistent cybersecurity threat, named Tangerine Turkey, has been identified as a major player in a widespread global crypto mining campaign. This...
image provided by Pixabay

Cybercriminals Exploit LA Wildfires with Sophisticated Scams

0
As the devastating wildfires continue to wreak havoc in Los Angeles, cybercriminals are seizing the opportunity to exploit the chaos, targeting both victims and...
image provided by pixabay

Regime-Backed North Korean Hackers Steal $308 Million in Cyberattack

0
In a major cyber heist, North Korean-linked hackers stole $308 million in cryptocurrency from the Japanese crypto exchange DMM Bitcoin. The FBI, in collaboration...
Image by Pixabay

The Small Modular Nuclear Reactor for Energy-Hungry Data Centers

0
As the global demand for artificial intelligence (AI) and cloud services surges, so does the pressure on data centers to meet their ever-growing energy...
Image by Unsplash

Scammers Target OpenAI Twitter with Fake Token Scheme

0
On September 24th, the Twitter account of OpenAI, the company behind the ChatGPT platform, was hijacked by scammers who posted a fraudulent announcement regarding...
Image provided by Unsplash

Trump Family X Accounts Hacked

0
In a troubling incident, scammers have compromised the X accounts of several Trump family members to promote a fraudulent cryptocurrency token, before the launch...
image provided by pixabay

Blockchain Method Protects Personal User Data

0
Imagine this scenario: you enter a website, and before you can access any of the information there is an annoying popup asking you to...
images provided by pixabay

Call for Startups – iHLS Innovation Centre

0
iHLS is an accelerator for the security sector and its various unique characteristics that provides startups with recognition, international exposure, access to investors and...
image provided by pixabay

Researchers Develop Possible Solution to Disinformation

0
Researchers from the University of Waterloo's Faculty of Engineering are developing a first-of-its-kind innovative system against fake news that relies on blockchain. Their goal?...
image provided by pixabay

Decentralized Storage – A Solution to Cloud-Based Attacks

0
Nowadays, turning to cloud-based providers for data storage is a common practice of businesses. It offers a convenient and affordable solution, cutting costs of...
Social media. image provided by pixabay

Blockchain Based Social Media Shows Promise

0
Nowadays, everybody is talking about data security and privacy, especially when talking about the future of social media. Platforms based on blockchain are also...
image by pixabay

Blockchain As a Robot Communication Tool

0
The technology used for salespeople documentation and evaluation is now helping police departments. The vast majority of police body camera footage never gets reviewed,...
critical infrastructure. image by pixabay

Critical Infrastructure Secured Via Artificial Intelligence

0
A new project launched in Japan aims at improving the security of critical infrastructure using artificial intelligence solutions. The non-profit organisation IOTA Foundation, developing...
image by pixabay

Wireless AI Enhances Security in Critical Sites

0
A new wireless AI blockchain technology is going to change the way airports manage security checks. Smart security trays will connect with passengers without...
IoT. image by pixabay

Blockchain Is The New IoT Standard

0
Blockchain is the new solution for Internet of Things (IoT) interoperability. IoT is all the sensors and smart devices that use the internet to...
blockchain

Blockchain Technology for Tracking Drones

0
A UK government-sponsored trial demonstrated the capability to safely track the movements of military, enterprise, and government drones once out of visual line of...
blockchain

Blockchain – Not Just for Bitcoin

0
The use of blockchain technology as a communication tool for a team of robots could provide security and safeguard against deception, according to a...
innotech

Register Now to INNOTECH Cyber, HLS and Innovation Event

0
iHLS is proud to present INNOTECH 2021 - the International Cyber, Homeland Security Technologies and Innovation event. A giant two-day exhibition with national pavilions...
photo illus. artificial intelligence by Pixabay

Groundbreaking Startup? Apply Now to IMoD’s Innovation Center

0
Startup! This is your opportunity to get a $50K grant. If you are developing a groundbreaking technology we invite you to apply to INNOFENSE...
INNOTECH

Apply Now to INNOFENSE – IMoD’s Unique Innovation Program

0
Startup! This is your opportunity to get a $50K grant. If you are developing a groundbreaking technology we invite you to apply to INNOFENSE...
Photo-illust.-Nellis-US-Air-Force-Base-Wikimedia

Terrorist Organizations Have New Non-Lethal Weapon

0
Cryptocurrency can be difficult to track, making it a popular tool for money laundering and other illicit activity. As cryptocurrency technology advances and becomes...

Latest

Police Under Scrutiny for Secretive Use of Live Facial Recognition Surveillance

0
A growing controversy has emerged over the New Orleans Police Department's use of facial recognition technology, following revelations that officers secretly leveraged live surveillance...