Cyber Security

Cyber Security

cyber attack

A new scanning tool was developed by an international team of researchers to boost cyber security and make websites less vulnerable to hacking and...
Photo illus. by Pixabay cyber-security

More and more components of homes and businesses go “smart” and internet-connected. These IoT devices are exposed to the lack of adequate security in...
Photo illus. cyber security by Pixabay

While cyber criminals are constantly changing their tactics, legislation and standardization often take years, leaving law enforcement efforts without substantial countermeasures. Now, Europe is...
photo illust. airport

By: Or Shalom, HLS expert MILIPOL exhibition, held in Singapore last week, May 18-20th, 2022, showcased advanced HLS technologies for the battlefield, border protection, and...
AI

A US think tank evaluates that the civil-military divide over the potential use of artificial intelligence (AI) is not as wide as one might...
photo illus. cybersecurity by Pixabay

The U.S. military said it dispatched a cyber team to Lithuania to expose malign activity and strengthen the country’s networks amid mounting Russian aggression...
electromagnetic spectrum, Photo illus. soldiers by US National Archives

In a jamming environment, emergency response or law enforcement missions may be compromised by the lack or unreliability of communications. A counter-jamming exercise held...
Photo illus. hacker by Pixabay

Hackers helped the US Administration detect cyber vulnerabilities. More than 400 vulnerabilities were found in US Department of Defense contractor’s networks thanks to the...
Photo illus. critical infrastructure by Pixabay

The Internet of Things, or IoT, is made up of interconnected sensors and devices networked with computers. Alongside consumer devices like smartwatches etc, many...
Photo illust. soldier US Navy by Kim Smith

The US Army has been buying large amounts of small drones for use among regular units, and it could be that in the near...
Photo illus. by Pixabay cyber-security

Deepfake technology has become one of the biggest threats faced by society today, claims a recent report by University College London (UCL). In fact,...
Hackers Target Israel in a New Cyberattack Operation

Under OpIsrael, anti-Israel hacker groups coordinate cyber attacks against Israel each April. New cyber attacks are ready to be launched against Israel, under the...
Smartphone photo by Pixabay

Are you experiencing online ads following you on topics you were just discussing with your friends or family? Today, microphones can be found almost...
Cyber Warefare, Photo illust. by Pixabay

On Tuesday, Locked Shields kicked off the largest and most complex cyber defense exercise in the world, which is held every year to train...
UK, Downing St. London, by Pixabay

Cyberspace is often divided into two layers: a defensive layer and an offensive layer. However, because all of us are interconnected through the network,...
Photo illus. smart city by Pxfuel

As part of tomorrow's city planning, smart cities will utilize both information and communication technologies as well as Internet of Things (IoT) solutions in...
Power station illus. by Pixabay

Cyberspace's complex nature continues to make cyber threats a real and growing problem. The cyber threat is real for many countries, both from state-sponsored...
Cybersecurity illus. by Pixabay

In today's defense industry, computing capabilities, software, wireless systems and advanced technologies are used to transform cyber security vulnerabilities into actions that become significant...
Photo illus. cyber security by Pixabay

In the 21st century, technology has become an integral part of our lives. We are constantly exposed to it on a daily basis, and...
photo illustration, USS Portland photo from US Navy Flickr

The U.S. Navy has wrongly framed cyber security for years, but is now formulating a new approach consistent with the pace and technological advancements...
Mobile Phono, Photo illus. by Pixabay

The technology giant appears to be raising privacy concerns among lawmakers worldwide, following a complaint filed by a privacy activist in France, and a...
Hacker illus. by Pixabay

Over the past few years, machine learning has gained popularity, and it is being integrated with more and more technologies and tools. A major...